CVE-2024-9355

medium

Description

A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.

References

https://bugzilla.redhat.com/show_bug.cgi?id=2315719

https://access.redhat.com/security/cve/CVE-2024-9355

https://access.redhat.com/errata/RHSA-2024:9551

https://access.redhat.com/errata/RHSA-2024:8847

https://access.redhat.com/errata/RHSA-2024:8678

https://access.redhat.com/errata/RHSA-2024:8327

https://access.redhat.com/errata/RHSA-2024:7550

https://access.redhat.com/errata/RHSA-2024:7502

https://access.redhat.com/errata/RHSA-2024:10133

Details

Source: Mitre, NVD

Published: 2024-10-01

Updated: 2024-11-15

Risk Information

CVSS v2

Base Score: 5.7

Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:P

Severity: Medium

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L

Severity: Medium