CVE-2024-1394: Missing Release of Memory after Effective Lifetime in Red Hat Red Hat Ansible Automation Platform 2.4 for RHEL 8
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
AI Analysis
Technical Summary
CVE-2024-1394 identifies a memory leak vulnerability in the RSA encryption/decryption code within the Golang FIPS OpenSSL wrapper used by Red Hat Ansible Automation Platform 2.4 on Red Hat Enterprise Linux 8. The vulnerability arises from improper handling of memory objects 'pkey' and 'ctx' during error conditions in the function located at github.com/golang-fips/openssl/openssl/rsa.go#L113. Specifically, the function uses named return parameters and deferred cleanup logic intended to free these objects on error, but all error return paths use the pattern 'return nil, nil, fail(...)', causing the deferred function to receive nil pointers and skip freeing the allocated memory. This results in a memory leak that can be triggered by attacker-controlled inputs during RSA operations. The leak can accumulate over time, leading to resource exhaustion and denial of service. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, no required privileges or user interaction, and a significant impact on availability. No known exploits are currently reported. The vulnerability affects Red Hat Ansible Automation Platform 2.4 running on RHEL 8, a widely used automation tool in enterprise environments. The flaw does not impact confidentiality or integrity but can disrupt operations by exhausting system memory resources.
Potential Impact
For European organizations, the primary impact of CVE-2024-1394 is on availability. Red Hat Ansible Automation Platform is commonly used for automating IT infrastructure, application deployment, and configuration management. A successful exploitation causing memory leaks can degrade system performance or cause crashes, interrupting automated workflows and potentially delaying critical business operations. This can be particularly damaging in sectors relying heavily on automation such as finance, telecommunications, manufacturing, and public services. While the vulnerability does not expose sensitive data or allow unauthorized access, the denial of service effect can lead to operational downtime and increased incident response costs. Organizations with large-scale Ansible deployments or those running automation in production environments are at higher risk. The lack of required authentication or user interaction means attackers can remotely trigger the vulnerability, increasing exposure. The absence of known exploits provides some time for mitigation, but proactive patching and monitoring are essential to prevent service disruption.
Mitigation Recommendations
1. Apply official patches or updates from Red Hat as soon as they become available to address the memory leak in the Golang FIPS OpenSSL RSA code. 2. Until patches are deployed, implement resource monitoring on systems running Ansible Automation Platform to detect abnormal memory usage trends that may indicate exploitation attempts. 3. Restrict network access to Ansible Automation Platform interfaces to trusted IPs and networks to reduce exposure to remote attackers. 4. Employ input validation and sanitization where possible to limit attacker-controlled inputs triggering RSA operations. 5. Consider deploying rate limiting or throttling mechanisms on automation API endpoints to mitigate resource exhaustion attempts. 6. Regularly audit and review automation workflows to identify and isolate critical systems to minimize impact in case of disruption. 7. Maintain up-to-date incident response plans that include scenarios involving denial of service due to resource exhaustion vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2024-1394: Missing Release of Memory after Effective Lifetime in Red Hat Red Hat Ansible Automation Platform 2.4 for RHEL 8
Description
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
AI-Powered Analysis
Technical Analysis
CVE-2024-1394 identifies a memory leak vulnerability in the RSA encryption/decryption code within the Golang FIPS OpenSSL wrapper used by Red Hat Ansible Automation Platform 2.4 on Red Hat Enterprise Linux 8. The vulnerability arises from improper handling of memory objects 'pkey' and 'ctx' during error conditions in the function located at github.com/golang-fips/openssl/openssl/rsa.go#L113. Specifically, the function uses named return parameters and deferred cleanup logic intended to free these objects on error, but all error return paths use the pattern 'return nil, nil, fail(...)', causing the deferred function to receive nil pointers and skip freeing the allocated memory. This results in a memory leak that can be triggered by attacker-controlled inputs during RSA operations. The leak can accumulate over time, leading to resource exhaustion and denial of service. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, no required privileges or user interaction, and a significant impact on availability. No known exploits are currently reported. The vulnerability affects Red Hat Ansible Automation Platform 2.4 running on RHEL 8, a widely used automation tool in enterprise environments. The flaw does not impact confidentiality or integrity but can disrupt operations by exhausting system memory resources.
Potential Impact
For European organizations, the primary impact of CVE-2024-1394 is on availability. Red Hat Ansible Automation Platform is commonly used for automating IT infrastructure, application deployment, and configuration management. A successful exploitation causing memory leaks can degrade system performance or cause crashes, interrupting automated workflows and potentially delaying critical business operations. This can be particularly damaging in sectors relying heavily on automation such as finance, telecommunications, manufacturing, and public services. While the vulnerability does not expose sensitive data or allow unauthorized access, the denial of service effect can lead to operational downtime and increased incident response costs. Organizations with large-scale Ansible deployments or those running automation in production environments are at higher risk. The lack of required authentication or user interaction means attackers can remotely trigger the vulnerability, increasing exposure. The absence of known exploits provides some time for mitigation, but proactive patching and monitoring are essential to prevent service disruption.
Mitigation Recommendations
1. Apply official patches or updates from Red Hat as soon as they become available to address the memory leak in the Golang FIPS OpenSSL RSA code. 2. Until patches are deployed, implement resource monitoring on systems running Ansible Automation Platform to detect abnormal memory usage trends that may indicate exploitation attempts. 3. Restrict network access to Ansible Automation Platform interfaces to trusted IPs and networks to reduce exposure to remote attackers. 4. Employ input validation and sanitization where possible to limit attacker-controlled inputs triggering RSA operations. 5. Consider deploying rate limiting or throttling mechanisms on automation API endpoints to mitigate resource exhaustion attempts. 6. Regularly audit and review automation workflows to identify and isolate critical systems to minimize impact in case of disruption. 7. Maintain up-to-date incident response plans that include scenarios involving denial of service due to resource exhaustion vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-02-09T06:02:35.056Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd66f4
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 2/5/2026, 8:19:26 AM
Last updated: 2/7/2026, 9:33:11 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.