CVE-2024-1394

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-1394
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-1394.json
Aliases
Related
Published
2024-03-21T13:00:08Z
Modified
2024-05-14T13:08:36.344941Z
Summary
[none]
Details

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

References

Affected packages

Git / github.com/golang-fips/openssl

Affected ranges

Type
GIT
Repo
https://github.com/golang-fips/openssl
Events
Introduced
0The exact introduced commit is unknown
Fixed
Type
GIT
Repo
https://github.com/microsoft/go-crypto-openssl
Events
Introduced
0The exact introduced commit is unknown
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.2.1
v0.2.2
v0.2.3
v0.2.4
v0.2.5
v0.2.6
v0.2.7
v0.2.8

v2.*

v2.0.0
v2.0.0-rc.1
v2.0.0-rc.2
v2.0.0-rc.3