vulnerability
Alma Linux: CVE-2024-24785: Important: golang security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:S/C:P/I:P/A:N) | Mar 5, 2024 | May 8, 2024 | Apr 20, 2026 |
Severity
6
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:N)
Published
Mar 5, 2024
Added
May 8, 2024
Modified
Apr 20, 2026
Description
If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.
Solutions
alma-upgrade-aardvark-dnsalma-upgrade-buildahalma-upgrade-buildah-testsalma-upgrade-cockpit-podmanalma-upgrade-conmonalma-upgrade-container-selinuxalma-upgrade-containernetworking-pluginsalma-upgrade-containers-commonalma-upgrade-critalma-upgrade-criualma-upgrade-criu-develalma-upgrade-criu-libsalma-upgrade-crunalma-upgrade-delvealma-upgrade-fuse-overlayfsalma-upgrade-go-toolsetalma-upgrade-golangalma-upgrade-golang-binalma-upgrade-golang-docsalma-upgrade-golang-miscalma-upgrade-golang-srcalma-upgrade-golang-testsalma-upgrade-libslirpalma-upgrade-libslirp-develalma-upgrade-netavarkalma-upgrade-oci-seccomp-bpf-hookalma-upgrade-podmanalma-upgrade-podman-catatonitalma-upgrade-podman-dockeralma-upgrade-podman-gvproxyalma-upgrade-podman-pluginsalma-upgrade-podman-remotealma-upgrade-podman-testsalma-upgrade-python3-criualma-upgrade-python3-podmanalma-upgrade-runcalma-upgrade-skopeoalma-upgrade-skopeo-testsalma-upgrade-slirp4netnsalma-upgrade-toolboxalma-upgrade-toolbox-testsalma-upgrade-udica
References
- CVE-2024-24785
- https://attackerkb.com/topics/CVE-2024-24785
- EUVD-EUVD-2024-22163
- https://errata.almalinux.org/8/ALSA-2024-3259.html
- https://errata.almalinux.org/8/ALSA-2026-3428.html
- https://errata.almalinux.org/9/ALSA-2024-2562.html
- https://errata.almalinux.org/9/ALSA-2024-9135.html
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-22163
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.