CVE-2024-24790:
The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6...
9.8
CVSS ScoreBasic Information
Technical Details
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The primary source for identifying the vulnerable functions is the Go vulnerability page https://pkg.go.dev/vuln/GO-2024-2887. This page explicitly lists the affected symbols (methods) within the 'net/netip' package. The vulnerability description states that these 'Is' methods did not correctly handle IPv4-mapped IPv6 addresses. Although the direct patch content from the Gerrit CL (https://go.dev/cl/590316) could not be fetched and analyzed by the available tools, the information from pkg.go.dev is considered authoritative for Go vulnerabilities. The functions listed are methods of the 'Addr' type in the 'net/netip' package. The file path 'src/net/netip/netip.go' is the standard location for this package's source code in the Go repository. The vulnerability lies in these functions returning incorrect boolean values, which could lead to flawed logic in applications relying on these checks for network policy enforcement, security zoning, or other IP address classification tasks.