vulnerability
Alma Linux: CVE-2024-9355: Moderate: go-toolset:rhel8 security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:M/Au:S/C:C/I:C/A:P) | Oct 1, 2024 | Oct 7, 2024 | Nov 13, 2025 |
Severity
6
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:P)
Published
Oct 1, 2024
Added
Oct 7, 2024
Modified
Nov 13, 2025
Description
A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.
Solutions
alma-upgrade-delvealma-upgrade-git-lfsalma-upgrade-go-toolsetalma-upgrade-golangalma-upgrade-golang-binalma-upgrade-golang-docsalma-upgrade-golang-miscalma-upgrade-golang-srcalma-upgrade-golang-testsalma-upgrade-grafanaalma-upgrade-grafana-pcpalma-upgrade-grafana-selinuxalma-upgrade-osbuildalma-upgrade-osbuild-composeralma-upgrade-osbuild-composer-corealma-upgrade-osbuild-composer-workeralma-upgrade-osbuild-depsolve-dnfalma-upgrade-osbuild-luks2alma-upgrade-osbuild-lvm2alma-upgrade-osbuild-ostreealma-upgrade-osbuild-selinuxalma-upgrade-python3-osbuild
References
- CVE-2024-9355
- https://attackerkb.com/topics/CVE-2024-9355
- CWE-457
- URL-https://errata.almalinux.org/8/ALSA-2024-7502.html
- URL-https://errata.almalinux.org/8/ALSA-2024-8327.html
- URL-https://errata.almalinux.org/8/ALSA-2024-8847.html
- URL-https://errata.almalinux.org/9/ALSA-2024-7550.html
- URL-https://errata.almalinux.org/9/ALSA-2024-8678.html
- URL-https://errata.almalinux.org/9/ALSA-2025-7118.html
- URL-https://errata.almalinux.org/9/ALSA-2025-7256.html
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.