Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
| Vendor | Product | Versions |
|---|---|---|
| go standard library | crypto/x509 | 0, 1.26.0-0, 1.25.8, 1.26.1 |
Updated affected versions to include 1.25.8 and 1.26.1, changed severity to HIGH, marked as actively exploited, and noted that no exploit is available.
Initial creation