A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.
https://access.redhat.com/errata/RHSA-2025:2416
https://access.redhat.com/errata/RHSA-2024:9551
https://access.redhat.com/errata/RHSA-2024:8847
https://access.redhat.com/errata/RHSA-2024:8678
https://access.redhat.com/errata/RHSA-2024:8327
https://access.redhat.com/errata/RHSA-2024:7550
Published: 2024-10-01
Updated: 2025-03-05
Base Score: 5.7
Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:P
Severity: Medium
Base Score: 6.5
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
Severity: Medium
Base Score: 7.6
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.00049