Medium severity6.5NVD Advisory· Published Oct 1, 2024· Updated Apr 15, 2026
CVE-2024-9355
CVE-2024-9355
Description
A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/golang-fips/opensslGo | <= 2.0.3 | — |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
18- github.com/advisories/GHSA-3h3x-2hwv-hr52ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-9355ghsaADVISORY
- access.redhat.com/errata/RHSA-2024:10133nvdWEB
- access.redhat.com/errata/RHSA-2024:7502nvdWEB
- access.redhat.com/errata/RHSA-2024:7550nvdWEB
- access.redhat.com/errata/RHSA-2024:8327nvdWEB
- access.redhat.com/errata/RHSA-2024:8678nvdWEB
- access.redhat.com/errata/RHSA-2024:8847nvdWEB
- access.redhat.com/errata/RHSA-2024:9551nvdWEB
- access.redhat.com/errata/RHSA-2025:2416nvdWEB
- access.redhat.com/errata/RHSA-2025:7118nvdWEB
- access.redhat.com/errata/RHSA-2025:7256nvdWEB
- access.redhat.com/errata/RHSA-2025:7624nvdWEB
- access.redhat.com/security/cve/CVE-2024-9355nvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/github/advisory-database/pull/4950ghsaWEB
- github.com/golang-fips/openssl/pull/198nvdWEB
- pkg.go.dev/vuln/GO-2024-3167ghsaWEB
News mentions
0No linked articles in our index yet.