If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.
History

Thu, 16 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Golang
Golang go
CPEs cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Vendors & Products Golang
Golang go

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library crypto Tls
Vendors & Products Go Standard Library
Go Standard Library crypto Tls

Wed, 08 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
Description If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.
Title Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published: 2026-04-08T01:06:57.670Z

Updated: 2026-04-13T18:19:55.848Z

Reserved: 2026-03-11T16:38:46.556Z

Link: CVE-2026-32283

cve-icon Vulnrichment

Updated: 2026-04-13T17:51:42.115Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T02:16:03.580

Modified: 2026-04-16T19:12:10.540

Link: CVE-2026-32283

cve-icon Redhat

No data.