First published: Wed May 08 2024(Updated: )
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Go | <1.22.3 | 1.22.3 |
redhat/Go | <1.21.10 | 1.21.10 |
debian/golang-1.15 | 1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 | |
debian/golang-1.22 | 1.22.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24788 has been classified as a medium severity vulnerability due to its potential to cause an infinite loop in DNS message processing.
To remediate CVE-2024-24788, update IBM Concert Software to version 1.0.2 or higher, or ensure that affected Go packages are upgraded to their corresponding fixed versions.
CVE-2024-24788 affects IBM Concert Software versions 1.0.0 to 1.0.1 and several Go package versions including Go 1.22.3 and earlier.
The impact of CVE-2024-24788 includes potential denial of service due to the affected Lookup functions getting stuck in an infinite loop.
Detailed information regarding CVE-2024-24788 can be found in security advisories published by the respective vendors and cybersecurity communities.