First published: Tue Mar 05 2024(Updated: )
Golang Go is vulnerable to a denial of service, caused by a flaw in the crypto/x509 package when verifying a certificate chain. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause Certificate.Verify to panic, and results in a denial of service condition.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/go | <1.21.8 | 1.21.8 |
redhat/go | <1.22.1 | 1.22.1 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 | |
debian/golang-1.22 | 1.22.12-3 | |
IBM Rational Team Concert | <=1.0.0, 1.0.1, 1.0.2, 1.0.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24783 has a high severity rating due to its potential to cause denial of service by exploiting flaws in the crypto/x509 package.
To mitigate CVE-2024-24783, upgrade to Go version 1.21.8 or higher, or to 1.22.1 or higher, depending on your distribution.
IBM Concert Software versions 1.0.0 to 1.0.2.1 are vulnerable to CVE-2024-24783.
The vulnerable packages in Debian are golang-1.15 up to version 1.15.15-1~deb11u4 and golang-1.19 up to version 1.19.8-2.
Currently, there is no known workaround for CVE-2024-24783; upgrading to a patched version is the recommended solution.