First published: Tue Apr 04 2023(Updated: )
Golang Go is vulnerable to a denial of service, caused by an memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.19.8 | |
Golang Go | >=1.20.0<1.20.3 | |
redhat/golang | <1.20.3 | 1.20.3 |
redhat/golang | <1.19.8 | 1.19.8 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 | |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24534 is a vulnerability related to HTTP and MIME header parsing, which can lead to a denial of service due to memory allocation issues.
The severity of CVE-2023-24534 is high with a severity value of 7.5.
The affected software includes golang versions up to and excluding 1.19.8 and 1.20.3.
To fix CVE-2023-24534, it is recommended to update the affected golang packages to versions 1.19.8 or 1.20.3, depending on the current installed version.
Yes, you can find more information about CVE-2023-24534 at the following references: [Reference 1](https://go.dev/cl/481994), [Reference 2](https://go.dev/issue/58975), [Reference 3](https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8).