CVE-2024-34155

NameCVE-2024-34155
DescriptionCalling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-1.15 (PTS)bullseye1.15.15-1~deb11u4vulnerable
golang-1.19 (PTS)bookworm1.19.8-2vulnerable
golang-1.22 (PTS)sid, trixie1.22.7-1fixed
golang-1.23 (PTS)sid, trixie1.23.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-1.15source(unstable)(unfixed)
golang-1.19source(unstable)(unfixed)
golang-1.21source(unstable)(unfixed)
golang-1.22source(unstable)1.22.7-1
golang-1.23source(unstable)1.23.1-1

Notes

[bookworm] - golang-1.19 <no-dsa> (Minor issue)
[bullseye] - golang-1.15 <no-dsa> (Minor issue)
https://groups.google.com/g/golang-announce/c/K-cEzDeCtpc
https://go.dev/issue/69138
https://github.com/golang/go/commit/53487e5477151ed75da50e50a0ba8f1ca64c00a3 (go1.23.1)
https://github.com/golang/go/commit/b232596139dbe96a62edbe3a2a203e856bf556eb (go1.22.7)

Search for package or bug name: Reporting problems