First published: Tue Apr 04 2023(Updated: )
Golang Go is vulnerable to a denial of service, caused by a flaw during multipart form parsing. By sending a specially crafted input, a remote attacker could exploit this vulnerability to consume large amounts of CPU and memory, and results in a denial of service condition.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.19.8 | |
Golang Go | >=1.20.0<1.20.3 | |
redhat/golang | <1.20.3 | 1.20.3 |
redhat/golang | <1.19.8 | 1.19.8 |
IBM Concert Software | <=1.0.0 - 1.0.1 | |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24536 is a vulnerability that allows for consuming large amounts of CPU and memory during multipart form parsing.
CVE-2023-24536 has a severity rating of 7.5 (High).
CVE-2023-24536 affects the affected software by causing excessive consumption of CPU and memory when processing multipart form inputs with a large number of parts.
To fix CVE-2023-24536, update the affected software to version 1.20.3 (for Red Hat's golang package) or version 1.19.8 (for Golang Go).
You can find more information about CVE-2023-24536 at the following references: [Reference 1](https://go.dev/cl/482075), [Reference 2](https://go.dev/cl/482076), [Reference 3](https://go.dev/cl/482077).