Advisory

Golang team reports two vulnerabilities, one critical

Take action: If you are building mpiling Go on Dawin OS (macOS, iOS, watchOS, tvOS, iPadOS, visionOS, and bridgeOS) you should patch your Golang ASAP. It's also wise to update the Golang for any web based applications, but that's a DoS vulnerability, so it will hurt you but it won't hack you. Your choice.


Learn More

The Go programming language team has released security updates to address two vulnerabilities, tracked as CVE-2024-24787 and CVE-2024-24788 that could allow attackers to execute arbitrary code and cause Denial of Service disruptions through infinite loops.

Details of the flaws:

  1. CVE-2024-24787 (CVSS score 9.8) - Arbitrary Code Execution Vulnerability on Darwin. This vulnerability is triggered by the improper use of the -lto_library flag in the #cgo LDFLAGS directive with Apple’s version of the linker (ld). Attackers can exploit this flaw by loading a malicious LTO (Link Time Optimization) library during the build process, leading to arbitrary code execution.
  2. CVE-2024-24788 (CVSS score 7.5) - Infinite Loop in DNS Lookup Functions. A specially crafted DNS response can cause Go’s DNS lookup functions to enter an infinite loop, potentially resulting in a Denial-of-Service (DoS) condition.
    • The flaw impacts web-facing applications and services using Go for DNS queries
    • This issue has  been addressed in the latest Go updates, versions 1.22.3 and 1.21.10.

Developers and system administrators are strongly urged to update their Go installations to versions 1.22.3 or 1.21.10.

Golang team reports two vulnerabilities, one critical