CVE-2024-1394

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-1394
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1394.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-1394
Aliases
Related
Published
2024-03-21T13:00:08Z
Modified
2024-10-12T11:16:06.488810Z
Summary
[none]
Details

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.

References

Affected packages

Git / github.com/golang-fips/openssl

Affected ranges

Type
GIT
Repo
https://github.com/golang-fips/openssl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/microsoft/go-crypto-openssl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.2.1
v0.2.2
v0.2.3
v0.2.4
v0.2.5
v0.2.6
v0.2.7
v0.2.8

v2.*

v2.0.0
v2.0.0-rc.1
v2.0.0-rc.2
v2.0.0-rc.3