{"id":"GO-2026-4946","summary":"Inefficient policy validation in crypto/x509","details":"Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service.\n\nThis only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.","aliases":["CVE-2026-32281"],"modified":"2026-04-08T01:15:42.842270Z","published":"2026-04-07T22:53:49Z","database_specific":{"review_status":"REVIEWED","url":"https://pkg.go.dev/vuln/GO-2026-4946"},"references":[{"type":"FIX","url":"https://go.dev/cl/758061"},{"type":"REPORT","url":"https://go.dev/issue/78281"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"}],"affected":[{"package":{"name":"stdlib","ecosystem":"Go","purl":"pkg:golang/stdlib"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.25.9"},{"introduced":"1.26.0-0"},{"fixed":"1.26.2"}]}],"ecosystem_specific":{"imports":[{"path":"crypto/x509","symbols":["Certificate.Verify","policiesValid"]}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2026-4946.json"}}],"schema_version":"1.7.5","credits":[{"name":"Jakub Ciolek - https://ciolek.dev"}]}