Memory Leak in Go RSA (golang-fips/openssl) Leads to Resource Exhaustion
CVE-2024-1394 Published on March 21, 2024

Golang-fips/openssl: memory leaks in code encrypting and decrypting rsa payloads
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2024-1394 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Timeline

Reported to Red Hat.

Made public. 43 days later.

Weakness Type

What is a Memory Leak Vulnerability?

The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory. This is often triggered by improper handling of malformed data or unexpectedly interrupted sessions. In some languages, developers are responsible for tracking memory allocation and releasing the memory. If there are no more pointers or references to the memory, then it can no longer be tracked and identified for release.

CVE-2024-1394 has been classified to as a Memory Leak vulnerability or weakness.


Products Associated with CVE-2024-1394

Want to know whenever a new CVE is published for Red Hat products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Red Hat Ansible Automation Platform 2.4 for RHEL 8: Red Hat Ansible Automation Platform 2.4 for RHEL 9: Red Hat Developer Tools: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions: Red Hat Enterprise Linux 9.2 Extended Update Support: Red Hat Enterprise Linux 9.2 Extended Update Support: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.12: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.13: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.14: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenShift Container Platform 4.15: Red Hat OpenStack Platform 16.2: Red Hat OpenStack Platform 17.1 for RHEL 8: Red Hat OpenStack Platform 17.1 for RHEL 9: Red Hat OpenStack Platform 17.1 for RHEL 9: Red Hat RHODF-4.16-RHEL-9: Red Hat RHODF-4.16-RHEL-9: Red Hat NBDE Tang Server: Red Hat OpenShift Developer Tools and Services: Red Hat OpenShift Developer Tools and Services: Red Hat OpenShift Pipelines: Red Hat OpenShift Serverless: Red Hat Ansible Automation Platform 1.2: Red Hat Ansible Automation Platform 1.2: Red Hat Certification for Red Hat Enterprise Linux 8: Red Hat Certification Program for Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 7: Red Hat Enterprise Linux 7: Red Hat Enterprise Linux 7: Red Hat Enterprise Linux 7: Red Hat Enterprise Linux 7: Red Hat Enterprise Linux 7: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 8: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat Enterprise Linux 9: Red Hat OpenShift Container Platform 4: Red Hat OpenShift Container Platform 4: Red Hat OpenShift Container Platform 4: Red Hat OpenShift Container Platform 4: Red Hat OpenShift Container Platform 4: Red Hat OpenShift Container Platform 4: Red Hat OpenShift Container Platform 4: Red Hat Openshift Container Storage 4: Red Hat OpenShift Dev Spaces: Red Hat OpenShift GitOps: Red Hat OpenShift on AWS: Red Hat OpenShift Virtualization 4: Red Hat OpenStack Platform 16.1: Red Hat OpenStack Platform 16.1: Red Hat OpenStack Platform 16.1: Red Hat OpenStack Platform 16.2: Red Hat OpenStack Platform 16.2: Red Hat OpenStack Platform 16.2: Red Hat OpenStack Platform 17.1: Red Hat OpenStack Platform 17.1: Red Hat OpenStack Platform 17.1: Red Hat OpenStack Platform 18.0: Red Hat Service Interconnect 1: Red Hat Service Interconnect 1: Red Hat Service Interconnect 1: Red Hat Software Collections: Red Hat Storage 3:

Exploit Probability

EPSS
1.02%
Percentile
76.96%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.