Memory Leak Vulnerability in Golang RSA Code Could Lead to Resource Exhaustion
CVE-2024-1394

7.5HIGH

Summary

A memory leak flaw has been identified in the RSA encrypting and decrypting code of the Golang FIPS OpenSSL library. This issue arises from improper handling of named return parameters, specifically within the RSA library's context initialization process. When errors occur during context initialization or property settings, the related pointers, namely 'pkey' and 'ctx', are left unfreed, leading to a potential resource exhaustion vulnerability. Attackers can exploit this flaw through crafted inputs, causing the application to exhaust memory resources.

Affected Version(s)

Red Hat Ansible Automation Platform 2.4 for RHEL 8 0:1.4.5-1.el8ap

Red Hat Ansible Automation Platform 2.4 for RHEL 9 0:1.4.5-1.el9ap

Red Hat Developer Tools 0:1.19.13-6.el7_9

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Red Hat would like to thank @qmuntal and @r3kumar for reporting this issue.
.