First published: Tue Mar 05 2024(Updated: )
Last updated 18 September 2024
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/golang-google-protobuf | <=1.25.0+git20201208.160c747-1<=1.28.1-3 | 1.33.0-1 |
go/google.golang.org/protobuf/internal/encoding/json | <1.33.0 | 1.33.0 |
go/google.golang.org/protobuf/encoding/protojson | <1.33.0 | 1.33.0 |
go/google.golang.org/protobuf | <1.33.0 | 1.33.0 |
redhat/google.golang.org/protobuf | <1.33.0 | 1.33.0 |
F5 BIG-IP Next Central Manager | >=20.2.0<=20.2.1 | |
F5 BIG-IP Next | >=1.7.0<=1.9.2 | |
F5 BIG-IP Next | >=1.1.0<=1.3.1 | |
F5 F5OS-A | =1.7.0>=1.5.1<=1.5.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2 | |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24786 is categorized as a denial of service vulnerability due to an infinite loop flaw in the rotojson.Unmarshal function.
To fix CVE-2024-24786, update the affected software packages to version 1.33.0 or later.
CVE-2024-24786 affects the golang-google-protobuf package and certain versions of F5 and IBM products.
Yes, CVE-2024-24786 can be exploited remotely by sending specially crafted requests that trigger the infinite loop.
The impact of CVE-2024-24786 is that it can cause a denial of service, potentially rendering the affected service unresponsive.