PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-42508 golang.org/x/crypto CVE debrief

CVE-2026-42508 describes a certificate-validation defect in Go’s security tooling where a revoked CA "SignatureKey" was not correctly checked for revocation. According to the supplied description, the fix now validates both the certificate key and its associated SignatureKey against @revoked. In practical terms, this is the kind of issue that can weaken trust decisions if a revoked CA key is still accepted under certain verification paths. The supplied references point to Go security materials, including a code change, an issue tracker entry, a security announcement, and the Go vulnerability database entry GO-2026-5021. The NVD record in the corpus was still marked "Received" and did not include a CVSS score at publication time.

Vendor
golang.org/x/crypto
Product
golang.org/x/crypto/ssh/knownhosts
CVSS
Unknown
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-22
Original CVE updated
2026-05-22
Advisory published
2026-05-22
Advisory updated
2026-05-22

Who should care

Teams that build or ship software using Go’s certificate-validation stack, especially products that rely on x509 chain verification, CA trust decisions, or automated certificate handling. Security and platform teams should also care if they operate infrastructure that depends on Go-based services for TLS or certificate parsing.

Technical summary

The issue is a revocation-checking gap in Go’s handling of CA-related keys. The supplied description says a revoked "SignatureKey" belonging to a CA was not correctly checked for revocation, and the fix ensures both "key" and "key.SignatureKey" are checked for @revoked. Based on the corpus, this is a trust-validation problem rather than an execution flaw: the risk is that a revoked CA-associated key could be treated as valid in some verification flow. The references indicate the problem was tracked and fixed in Go and recorded as GO-2026-5021.

Defensive priority

High for any environment that depends on Go for certificate validation or trust decisions. Even without a CVSS score in the supplied record, revocation-check failures can undermine the integrity of PKI enforcement, so affected teams should treat this as a security-relevant validation fix and confirm they are on a build containing the remediation.

Recommended defensive actions

  • Confirm whether any applications, libraries, or services in your environment depend on Go's x509 certificate verification or related CA trust logic.
  • Review the Go security announcement and the linked vulnerability record GO-2026-5021 for the remediation guidance associated with this issue.
  • Upgrade to a Go version that includes the fix referenced by the supplied Go security materials.
  • If you cannot upgrade immediately, assess whether your deployment relies on certificate revocation enforcement and add compensating controls or monitoring around certificate trust decisions.
  • Re-test any certificate-validation behavior in staging after upgrading, especially workflows that process CA-signed certificates or revocation-related paths.

Evidence notes

The corpus includes a concise CVE description stating that a revoked CA SignatureKey was not correctly checked for revocation and that both key and key.SignatureKey are now checked for @revoked. The only linked technical references provided are Go-hosted sources: a code review, an issue tracker entry, a security announcement, and a Go vulnerability database entry. The NVD item in the corpus lists vulnStatus as Received and provides no CVSS vector or score, so severity is inferred only from the nature of the trust-validation defect. Vendor attribution is low confidence because the corpus points to Go as the relevant project, but no product string was supplied.

Official resources

Publicly disclosed on 2026-05-22 in the supplied CVE and source metadata. The corpus does not provide exploit details, and the NVD entry was still marked Received at the time of the supplied snapshot.