CVE-2024-1394: Missing Release of Memory after Effective Lifetime in Red Hat Red Hat Ansible Automation Platform 2.4 for RHEL 8
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
AI Analysis
Technical Summary
CVE-2024-1394 identifies a memory leak vulnerability in the RSA encrypting/decrypting code within the Golang FIPS OpenSSL wrapper used by Red Hat Ansible Automation Platform 2.4 on RHEL 8. The root cause is a coding flaw in github.com/golang-fips/openssl/openssl/rsa.go at line 113, where memory objects 'pkey' and 'ctx' are not properly freed after their effective lifetime during error handling. Specifically, the function uses named return parameters to free these objects if an error occurs during context initialization or property setting. However, all error return statements follow a pattern that returns nil for these objects, causing the deferred cleanup function to receive nil pointers and thus skip freeing the allocated memory. This leads to a memory leak that can be triggered by attacker-controlled inputs, potentially exhausting system resources. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits are currently reported, but the flaw poses a significant risk of denial-of-service attacks against systems running the affected platform.
Potential Impact
The primary impact of CVE-2024-1394 is resource exhaustion due to memory leaks, which can lead to denial of service (DoS) conditions on systems running Red Hat Ansible Automation Platform 2.4 on RHEL 8. This can disrupt automated IT operations, configuration management, and orchestration tasks critical to enterprise environments. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can cause service outages or degrade performance, impacting availability. Organizations relying heavily on Ansible Automation for infrastructure management may face operational disruptions, increased incident response costs, and potential cascading failures in dependent systems. While confidentiality and integrity are not directly impacted, the availability degradation can have severe business consequences, especially in environments requiring high uptime and reliability.
Mitigation Recommendations
Organizations should prioritize applying official patches or updates from Red Hat addressing CVE-2024-1394 once they become available. Until patches are deployed, administrators should monitor memory usage of Ansible Automation Platform instances closely to detect abnormal resource consumption. Limiting network exposure of affected Ansible services by implementing strict firewall rules and network segmentation can reduce attack surface. Employing runtime memory monitoring and automated alerts can help identify exploitation attempts early. Additionally, consider deploying rate limiting or input validation mechanisms to reduce the risk of triggering the memory leak via malformed inputs. Engaging with Red Hat support for guidance and applying any recommended workarounds or configuration changes is advised. Regularly updating Golang dependencies and verifying secure coding practices in custom Ansible modules can further mitigate risks.
Affected Countries
United States, Germany, Japan, United Kingdom, Canada, Australia, France, South Korea, India, Brazil
CVE-2024-1394: Missing Release of Memory after Effective Lifetime in Red Hat Red Hat Ansible Automation Platform 2.4 for RHEL 8
Description
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-1394 identifies a memory leak vulnerability in the RSA encrypting/decrypting code within the Golang FIPS OpenSSL wrapper used by Red Hat Ansible Automation Platform 2.4 on RHEL 8. The root cause is a coding flaw in github.com/golang-fips/openssl/openssl/rsa.go at line 113, where memory objects 'pkey' and 'ctx' are not properly freed after their effective lifetime during error handling. Specifically, the function uses named return parameters to free these objects if an error occurs during context initialization or property setting. However, all error return statements follow a pattern that returns nil for these objects, causing the deferred cleanup function to receive nil pointers and thus skip freeing the allocated memory. This leads to a memory leak that can be triggered by attacker-controlled inputs, potentially exhausting system resources. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability. No known exploits are currently reported, but the flaw poses a significant risk of denial-of-service attacks against systems running the affected platform.
Potential Impact
The primary impact of CVE-2024-1394 is resource exhaustion due to memory leaks, which can lead to denial of service (DoS) conditions on systems running Red Hat Ansible Automation Platform 2.4 on RHEL 8. This can disrupt automated IT operations, configuration management, and orchestration tasks critical to enterprise environments. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can cause service outages or degrade performance, impacting availability. Organizations relying heavily on Ansible Automation for infrastructure management may face operational disruptions, increased incident response costs, and potential cascading failures in dependent systems. While confidentiality and integrity are not directly impacted, the availability degradation can have severe business consequences, especially in environments requiring high uptime and reliability.
Mitigation Recommendations
Organizations should prioritize applying official patches or updates from Red Hat addressing CVE-2024-1394 once they become available. Until patches are deployed, administrators should monitor memory usage of Ansible Automation Platform instances closely to detect abnormal resource consumption. Limiting network exposure of affected Ansible services by implementing strict firewall rules and network segmentation can reduce attack surface. Employing runtime memory monitoring and automated alerts can help identify exploitation attempts early. Additionally, consider deploying rate limiting or input validation mechanisms to reduce the risk of triggering the memory leak via malformed inputs. Engaging with Red Hat support for guidance and applying any recommended workarounds or configuration changes is advised. Regularly updating Golang dependencies and verifying secure coding practices in custom Ansible modules can further mitigate risks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-02-09T06:02:35.056Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd66f4
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 3/18/2026, 6:17:38 PM
Last updated: 3/24/2026, 4:27:59 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.