PatchSiren cyber security CVE debrief
CVE-2026-46598 golang.org/x/crypto CVE debrief
CVE-2026-46598 is a Go security issue where certain crafted inputs could cause an ed25519.PrivateKey to be created by casting malformed wire bytes. When that malformed key is later used, it can panic. The practical security impact is service instability and potential denial of service in software that accepts or processes untrusted Ed25519 private key material.
- Vendor
- golang.org/x/crypto
- Product
- golang.org/x/crypto/ssh/agent
- CVSS
- Unknown
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-22
- Original CVE updated
- 2026-05-22
- Advisory published
- 2026-05-22
- Advisory updated
- 2026-05-22
Who should care
Teams that use Go’s ed25519 functionality, especially applications or libraries that ingest private key bytes from external sources, configuration files, network payloads, or other untrusted input. Operators should also care if crashes in authentication, signing, or key-management code would affect availability.
Technical summary
The issue described in the supplied sources is a type-safety and input-validation problem in Go’s Ed25519 key handling: malformed wire-format bytes could be cast into an ed25519.PrivateKey value instead of being rejected. That malformed key can later panic during use. The available evidence points to Go as the affected project, but the exact affected versions and fix range are not included in the supplied corpus.
Defensive priority
Medium-high. This is primarily an availability risk: a panic in cryptographic key handling can crash a process or take down a signing/authentication path. Prioritize remediation if your environment parses or reconstructs private keys from untrusted or semi-trusted inputs.
Recommended defensive actions
- Review the Go security announcement and advisory referenced in the source material, including GO-2026-5033, for the exact affected and fixed versions.
- Update affected Go toolchains or runtimes to the vendor-recommended fixed release once confirmed by the advisory.
- Avoid accepting unvalidated wire bytes directly as ed25519.PrivateKey values; treat malformed key material as an error, not a cast.
- Add or strengthen validation around key import, deserialization, and configuration loading paths that handle Ed25519 private keys.
- Monitor logs and crash reports for panics originating in key parsing or signing code, and treat repeated crashes as a potential indicator of exposure.
- If you ship libraries, document the expectation that callers must provide validated key material and propagate errors instead of converting malformed bytes into key types.
Evidence notes
Evidence is limited to the supplied NVD record and official Go references. The NVD item cites Go security references at go.dev/cl/781360, go.dev/issue/79596, a golang-announce post, and pkg.go.dev/vuln/GO-2026-5033. The vulnerability description provided states that malformed wire bytes could be cast into ed25519.PrivateKey and later panic. The vendor attribution is therefore treated as low confidence and anchored to Go based on the supplied references, not on external lookup.
Official resources
Published in the supplied CVE/NVD record on 2026-05-22. The NVD entry references official Go disclosure materials, indicating vendor acknowledgment and public advisory context on the same date.