CVE-2024-9355

Published: October 1, 2024Last modified: August 22, 2025

Description

A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.

Severity score breakdown

ParameterValue
Base score6.5
Attack VectorLOCAL
Attack complexityHIGH
Privileges requiredLOW
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactHIGH
Availability impactLOW
VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L

Notes

1. Do we have the Golang FIPS OpenSSL? 2. It is doubtful that the CVE is applicable to Go compiler: Debian denies it. RedHat is undetermined.

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSgoNot affected (1.19.7-r0)
StreamgoNot affected (1.20.5-r2)
Hardened Containers23 LTSgoNot affected (1.19.7-r0)
StreamgoNot affected (1.20.5-r2)

References

ON THIS PAGE