CVE-2024-9355
Published: October 1, 2024Last modified: June 25, 2025
Description
A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack Vector | LOCAL |
Attack complexity | HIGH |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | LOW |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L |
Notes
Do we have the Golang FIPS OpenSSL?
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | go | Unknown (1.19.7-r0) |
Stream | go | Unknown (1.20.5-r2) |
References
- https://access.redhat.com/errata/RHSA-2024:10133
- https://access.redhat.com/errata/RHSA-2024:7502
- https://access.redhat.com/errata/RHSA-2024:7550
- https://access.redhat.com/errata/RHSA-2024:8327
- https://access.redhat.com/errata/RHSA-2024:8678
- https://access.redhat.com/errata/RHSA-2024:8847
- https://access.redhat.com/errata/RHSA-2024:9551
- https://access.redhat.com/errata/RHSA-2025:2416
- https://access.redhat.com/errata/RHSA-2025:7118
- https://access.redhat.com/errata/RHSA-2025:7256
- https://access.redhat.com/errata/RHSA-2025:7624
- https://access.redhat.com/security/cve/CVE-2024-9355
- https://bugzilla.redhat.com/show_bug.cgi?id=2315719