First published: Tue Mar 14 2023(Updated: )
Parsing invalid messages can panic. Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/google.golang.org/protobuf | >=1.29.0<1.29.1 | 1.29.1 |
Protocol Buffers | =1.29.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24535 is classified as a moderate severity vulnerability due to its potential to cause a panic in the application.
To fix CVE-2023-24535, upgrade to version 1.29.1 of the google.golang.org/protobuf package or ensure you are not using version 1.29.0.
The panic in CVE-2023-24535 is caused by parsing a text-format message that contains a minus sign followed by whitespace and no further input.
CVE-2023-24535 affects versions 1.29.0 and earlier of the google.golang.org/protobuf package.
CVE-2023-24535 can lead to application crashes when invalid messages are processed, making it a concern for stability but not directly exploitative.