Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-9355

Опубликовано: 30 сент. 2024
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.

Отчет

This issue is specific to the Go language and only affects the test code in cri-o and conmon, not the production code. Since both projects use Go exclusively for testing purposes, this issue does not impact their production environment. Therefore, cri-o and conmon are not affected by this vulnerability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
NBDE Tang Servertang-operator-bundle-containerAffected
OpenShift Developer Tools and ServiceshelmAffected
OpenShift Developer Tools and ServicesodoAffected
OpenShift Pipelinesopenshift-pipelines-clientAffected
OpenShift Serverlessopenshift-serverless-clientsWill not fix
Red Hat Ansible Automation Platform 1.2helmAffected
Red Hat Ansible Automation Platform 1.2openshift-clientsAffected
Red Hat Ansible Automation Platform 2automation-gateway-proxyAffected
Red Hat Ansible Automation Platform 2receptorWill not fix
Red Hat Enterprise Linux 10buildahNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-457
https://bugzilla.redhat.com/show_bug.cgi?id=2315719golang-fips: Golang FIPS zeroed buffer

EPSS

Процентиль: 2%
0.00014
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
9 месяцев назад

A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.  It is also possible to force a derived key to be all zeros instead of an unpredictable value.  This may have follow-on implications for the Go TLS stack.

CVSS3: 6.5
msrc
6 месяцев назад

Описание отсутствует

rocky
7 месяцев назад

Moderate: grafana-pcp security update

rocky
8 месяцев назад

Moderate: golang security update

CVSS3: 6.5
github
9 месяцев назад

Golang FIPS OpenSSL has a Use of Uninitialized Variable vulnerability

EPSS

Процентиль: 2%
0.00014
Низкий

6.5 Medium

CVSS3