{"id":"CVE-2026-32283","summary":"Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls","details":"If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.","aliases":["BIT-golang-2026-32283","GO-2026-4870"],"modified":"2026-05-15T04:14:36.599650722Z","published":"2026-04-08T01:06:57.670Z","related":["ALSA-2026:14200","ALSA-2026:16875","ALSA-2026:17075","CGA-w7vv-7vph-696h","SUSE-SU-2026:1320-1","SUSE-SU-2026:1321-1","SUSE-SU-2026:1580-1","SUSE-SU-2026:1581-1","SUSE-SU-2026:21355-1","SUSE-SU-2026:21356-1","openSUSE-SU-2026:10514-1","openSUSE-SU-2026:10525-1","openSUSE-SU-2026:10664-1","openSUSE-SU-2026:20570-1","openSUSE-SU-2026:20571-1","openSUSE-SU-2026:20703-1"],"database_specific":{"unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"fixed":"1.25.9"},{"introduced":"1.26.0-0"},{"fixed":"1.26.2"}]}],"cna_assigner":"Go","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32283.json"},"references":[{"type":"WEB","url":"https://go.dev/cl/763767"},{"type":"WEB","url":"https://go.dev/issue/78334"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"},{"type":"WEB","url":"https://pkg.go.dev"},{"type":"WEB","url":"https://pkg.go.dev/vuln/GO-2026-4870"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32283.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32283"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}