CVE-2024-9355: Golang-fips: golang fips zeroed buffer

Description

A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.

Classification

CVE ID: CVE-2024-9355

Affected Products

Vendor: Red Hat

Product: Red Hat Enterprise Linux 7 Extended Lifecycle Support

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 15.23% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://access.redhat.com/errata/RHSA-2024:10133
https://access.redhat.com/errata/RHSA-2024:7502
https://access.redhat.com/errata/RHSA-2024:7550
https://access.redhat.com/errata/RHSA-2024:8327
https://access.redhat.com/errata/RHSA-2024:8678
https://access.redhat.com/errata/RHSA-2024:8847
https://access.redhat.com/errata/RHSA-2024:9551
https://access.redhat.com/security/cve/CVE-2024-9355
https://bugzilla.redhat.com/show_bug.cgi?id=2315719

Timeline