CVE-2024-9355
Published: October 1, 2024Last modified: August 22, 2025
Description
A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.5 |
| Attack Vector | LOCAL |
| Attack complexity | HIGH |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | LOW |
| Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L |
Notes
1. Do we have the Golang FIPS OpenSSL? 2. It is doubtful that the CVE is applicable to Go compiler: Debian denies it. RedHat is undetermined.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | go | Not affected (1.19.7-r0) |
| Stream | go | Not affected (1.20.5-r2) | |
| Hardened Containers | 23 LTS | go | Not affected (1.19.7-r0) |
| Stream | go | Not affected (1.20.5-r2) |
References
- https://access.redhat.com/errata/RHSA-2024:10133
- https://access.redhat.com/errata/RHSA-2024:7502
- https://access.redhat.com/errata/RHSA-2024:7550
- https://access.redhat.com/errata/RHSA-2024:8327
- https://access.redhat.com/errata/RHSA-2024:8678
- https://access.redhat.com/errata/RHSA-2024:8847
- https://access.redhat.com/errata/RHSA-2024:9551
- https://access.redhat.com/errata/RHSA-2025:2416
- https://access.redhat.com/errata/RHSA-2025:7118
- https://access.redhat.com/errata/RHSA-2025:7256
- https://access.redhat.com/errata/RHSA-2025:7624
- https://access.redhat.com/security/cve/CVE-2024-9355
- https://bugzilla.redhat.com/show_bug.cgi?id=2315719
- https://github.com/golang-fips/openssl/pull/198