CVE-2024-9355: Golang FIPS OpenSSL has a Use of Uninitialized Variable vulnerability
(updated )
A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.
References
- access.redhat.com/errata/RHSA-2024:10133
- access.redhat.com/errata/RHSA-2024:7502
- access.redhat.com/errata/RHSA-2024:7550
- access.redhat.com/errata/RHSA-2024:8327
- access.redhat.com/errata/RHSA-2024:8678
- access.redhat.com/errata/RHSA-2024:8847
- access.redhat.com/errata/RHSA-2024:9551
- access.redhat.com/security/cve/CVE-2024-9355
- bugzilla.redhat.com/show_bug.cgi?id=2315719
- github.com/advisories/GHSA-3h3x-2hwv-hr52
- github.com/github/advisory-database/pull/4950
- github.com/golang-fips/openssl
- github.com/golang-fips/openssl/pull/198
- nvd.nist.gov/vuln/detail/CVE-2024-9355
- pkg.go.dev/vuln/GO-2024-3167
Detect and mitigate CVE-2024-9355 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →