-
Bug
-
Resolution: Unresolved
-
Undefined
-
rhel-10.0.beta
-
None
-
golang-1.22.4-1.el10
-
None
-
Important
-
ZStream
-
3
-
rhel-sst-pt-llvm-rust-go
-
ssg_platform_tools
-
3
-
QE ack, Dev ack
-
False
-
-
Yes
-
Sprint 4, Sprint 5, Sprint 6
-
Approved Blocker
-
Unspecified Release Note Type - Unknown
-
None
Due to caching in the golang-fips/openssl@v2 backend, certain operations are no longer thread safe. We end up reusing EVP_CIPHER_CTX objects across EVP based operations, which can cause problems if these routines are called from multiple goroutines in parallel.
This issue was reported upstream by a Hashicorp Vault engineer: https://github.com/golang-fips/go/issues/187
- links to
-
RHSA-2024:131063 golang bug fix and enhancement update