CVE-2024-1394: Missing Release of Memory after Effective Lifetime in Red Hat Red Hat Ansible Automation Platform 2.4 for RHEL 8
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
AI Analysis
Technical Summary
CVE-2024-1394 is a high-severity memory leak vulnerability identified in the RSA encryption/decryption implementation within the Golang FIPS-compliant OpenSSL wrapper used by Red Hat Ansible Automation Platform 2.4 on RHEL 8. The flaw arises from improper handling of memory objects 'pkey' and 'ctx' during error conditions in the rsa.go source code. Specifically, the function responsible for RSA operations uses named return parameters and a deferred cleanup function intended to free these objects if initialization or property setting fails. However, all error return paths follow a pattern that returns nil values for 'pkey' and 'ctx', causing the deferred cleanup function to receive nil pointers and thus fail to release allocated memory. This results in a memory leak that can be triggered by attacker-controlled inputs, potentially leading to resource exhaustion on the affected system. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability degradation without compromising confidentiality or integrity. Although no known exploits are reported in the wild, the flaw could be leveraged in denial-of-service attacks against systems running the vulnerable Ansible Automation Platform version, especially in environments processing untrusted inputs or exposed to external networks. The vulnerability is specific to Red Hat Ansible Automation Platform 2.4 on RHEL 8, which integrates Golang FIPS OpenSSL libraries for cryptographic operations.
Potential Impact
For European organizations utilizing Red Hat Ansible Automation Platform 2.4 on RHEL 8, this vulnerability poses a significant risk of denial-of-service through resource exhaustion. An attacker could craft malicious inputs to the RSA encryption/decryption routines, causing the application to leak memory continuously until system resources are depleted, potentially leading to service outages or degraded performance. This can disrupt automation workflows critical for IT operations, configuration management, and deployment pipelines. Given the widespread use of Ansible in enterprise environments across Europe, including sectors such as finance, manufacturing, and government, the availability impact could affect business continuity and operational stability. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting downtime or degraded service availability can have cascading effects on dependent systems and services. Organizations with externally accessible Ansible automation interfaces or those processing untrusted inputs are at higher risk. The lack of required authentication or user interaction for exploitation further increases the threat surface.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating Red Hat Ansible Automation Platform to a patched version once available from Red Hat. In the interim, organizations can implement the following specific measures: 1) Restrict network access to Ansible Automation Platform interfaces to trusted internal networks or VPNs to reduce exposure to attacker-controlled inputs. 2) Implement strict input validation and sanitization on any user-supplied data that may be processed by the RSA cryptographic functions to minimize malformed or malicious inputs triggering the leak. 3) Monitor system memory usage and set up alerts for abnormal memory consumption patterns indicative of a leak or resource exhaustion attack. 4) Employ resource limits (e.g., cgroups or container memory limits) to contain the impact of potential memory leaks and prevent system-wide outages. 5) Review and harden automation workflows to avoid processing untrusted or unnecessary cryptographic operations. 6) Engage with Red Hat support to obtain any available patches or workarounds and apply them promptly. These targeted mitigations go beyond generic advice by focusing on access control, input hygiene, proactive monitoring, and resource containment specific to this memory leak vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Switzerland
CVE-2024-1394: Missing Release of Memory after Effective Lifetime in Red Hat Red Hat Ansible Automation Platform 2.4 for RHEL 8
Description
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
AI-Powered Analysis
Technical Analysis
CVE-2024-1394 is a high-severity memory leak vulnerability identified in the RSA encryption/decryption implementation within the Golang FIPS-compliant OpenSSL wrapper used by Red Hat Ansible Automation Platform 2.4 on RHEL 8. The flaw arises from improper handling of memory objects 'pkey' and 'ctx' during error conditions in the rsa.go source code. Specifically, the function responsible for RSA operations uses named return parameters and a deferred cleanup function intended to free these objects if initialization or property setting fails. However, all error return paths follow a pattern that returns nil values for 'pkey' and 'ctx', causing the deferred cleanup function to receive nil pointers and thus fail to release allocated memory. This results in a memory leak that can be triggered by attacker-controlled inputs, potentially leading to resource exhaustion on the affected system. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability degradation without compromising confidentiality or integrity. Although no known exploits are reported in the wild, the flaw could be leveraged in denial-of-service attacks against systems running the vulnerable Ansible Automation Platform version, especially in environments processing untrusted inputs or exposed to external networks. The vulnerability is specific to Red Hat Ansible Automation Platform 2.4 on RHEL 8, which integrates Golang FIPS OpenSSL libraries for cryptographic operations.
Potential Impact
For European organizations utilizing Red Hat Ansible Automation Platform 2.4 on RHEL 8, this vulnerability poses a significant risk of denial-of-service through resource exhaustion. An attacker could craft malicious inputs to the RSA encryption/decryption routines, causing the application to leak memory continuously until system resources are depleted, potentially leading to service outages or degraded performance. This can disrupt automation workflows critical for IT operations, configuration management, and deployment pipelines. Given the widespread use of Ansible in enterprise environments across Europe, including sectors such as finance, manufacturing, and government, the availability impact could affect business continuity and operational stability. While the vulnerability does not directly compromise data confidentiality or integrity, the resulting downtime or degraded service availability can have cascading effects on dependent systems and services. Organizations with externally accessible Ansible automation interfaces or those processing untrusted inputs are at higher risk. The lack of required authentication or user interaction for exploitation further increases the threat surface.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating Red Hat Ansible Automation Platform to a patched version once available from Red Hat. In the interim, organizations can implement the following specific measures: 1) Restrict network access to Ansible Automation Platform interfaces to trusted internal networks or VPNs to reduce exposure to attacker-controlled inputs. 2) Implement strict input validation and sanitization on any user-supplied data that may be processed by the RSA cryptographic functions to minimize malformed or malicious inputs triggering the leak. 3) Monitor system memory usage and set up alerts for abnormal memory consumption patterns indicative of a leak or resource exhaustion attack. 4) Employ resource limits (e.g., cgroups or container memory limits) to contain the impact of potential memory leaks and prevent system-wide outages. 5) Review and harden automation workflows to avoid processing untrusted or unnecessary cryptographic operations. 6) Engage with Red Hat support to obtain any available patches or workarounds and apply them promptly. These targeted mitigations go beyond generic advice by focusing on access control, input hygiene, proactive monitoring, and resource containment specific to this memory leak vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-02-09T06:02:35.056Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd66f4
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/4/2025, 9:26:54 PM
Last updated: 8/16/2025, 10:38:33 PM
Views: 14
Related Threats
CVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumCVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumCVE-2025-31715: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
CriticalCVE-2025-31714: CWE-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
MediumCVE-2025-31713: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.