First published: Tue Jun 04 2024(Updated: )
Last updated 14 November 2024
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/go | <1.22.4 | 1.22.4 |
redhat/go | <1.21.11 | 1.21.11 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 | |
debian/golang-1.22 | 1.22.12-3 | |
Golang | <1.21.11 | |
Golang | >=1.22.0<1.22.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24789 is considered a moderate severity vulnerability due to its potential for exploitation through malformed zip files.
To fix CVE-2024-24789, update the Go package to version 1.22.4 or higher for Red Hat and Debian systems wherever applicable.
CVE-2024-24789 affects versions of Go prior to 1.22.4, including 1.21.11 for Red Hat and 1.15.15-1~deb11u4 and 1.19.8-2 for Debian.
CVE-2024-24789 could potentially be exploited to manipulate zip file content rendering inconsistencies based on the underlying ZIP implementation.
CVE-2024-24789 primarily impacts the 'archive/zip' package in the Go programming language, differing from behavior in most other ZIP implementations.