Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1394: Missing Release of Memory after Effective Lifetime in Red Hat Red Hat Ansible Automation Platform 2.4 for RHEL 8

0
High
VulnerabilityCVE-2024-1394cvecve-2024-1394
Published: Thu Mar 21 2024 (03/21/2024, 12:16:38 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Ansible Automation Platform 2.4 for RHEL 8

Description

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 18:17:38 UTC

Technical Analysis

CVE-2024-1394 identifies a memory leak vulnerability in the RSA encrypting/decrypting code within the Golang FIPS OpenSSL wrapper used by Red Hat Ansible Automation Platform 2.4 on RHEL 8. The root cause is a coding flaw in github.com/golang-fips/openssl/openssl/rsa.go at line 113, where memory objects 'pkey' and 'ctx' are not properly freed after their effective lifetime during error handling. Specifically, the function uses named return parameters to free these objects if an error occurs during context initialization or property setting. However, all error return statements follow a pattern that returns nil for these objects, causing the deferred cleanup function to receive nil pointers and thus skip freeing the allocated memory. This leads to a memory leak that can be triggered by attacker-controlled inputs, potentially exhausting system resources. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits are currently reported, but the flaw poses a significant risk of denial-of-service attacks against systems running the affected platform.

Potential Impact

The primary impact of CVE-2024-1394 is resource exhaustion due to memory leaks, which can lead to denial of service (DoS) conditions on systems running Red Hat Ansible Automation Platform 2.4 on RHEL 8. This can disrupt automated IT operations, configuration management, and orchestration tasks critical to enterprise environments. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can cause service outages or degrade performance, impacting availability. Organizations relying heavily on Ansible Automation for infrastructure management may face operational disruptions, increased incident response costs, and potential cascading failures in dependent systems. While confidentiality and integrity are not directly impacted, the availability degradation can have severe business consequences, especially in environments requiring high uptime and reliability.

Mitigation Recommendations

Organizations should prioritize applying official patches or updates from Red Hat addressing CVE-2024-1394 once they become available. Until patches are deployed, administrators should monitor memory usage of Ansible Automation Platform instances closely to detect abnormal resource consumption. Limiting network exposure of affected Ansible services by implementing strict firewall rules and network segmentation can reduce attack surface. Employing runtime memory monitoring and automated alerts can help identify exploitation attempts early. Additionally, consider deploying rate limiting or input validation mechanisms to reduce the risk of triggering the memory leak via malformed inputs. Engaging with Red Hat support for guidance and applying any recommended workarounds or configuration changes is advised. Regularly updating Golang dependencies and verifying secure coding practices in custom Ansible modules can further mitigate risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-02-09T06:02:35.056Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd66f4

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 3/18/2026, 6:17:38 PM

Last updated: 3/24/2026, 4:27:59 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses