Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-35945

Опубликовано: 13 июл. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving RST_STREAM immediately followed by the GOAWAY frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the GOAWAY frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to GOAWAY frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.

A flaw was found in Envoy, where a specifically crafted response from an untrusted upstream service can cause a denial of service through memory exhaustion. This issue is caused by Envoy’s HTTP/2 codec, which may leak a header map and bookkeeping structures upon receiving RST_STREAM immediately, followed by the GOAWAY frames from an upstream server.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Core Servicesjbcs-httpd24-nghttp2Not affected
Red Hat OpenShift Service Mesh 2.2 for RHEL 8openshift-service-mesh/proxyv2-rhel8FixedRHSA-2023:517514.09.2023
Red Hat OpenShift Service Mesh 2.3 for RHEL 8openshift-service-mesh/proxyv2-rhel8FixedRHSA-2023:462411.08.2023
Red Hat OpenShift Service Mesh 2.4 for RHEL 8openshift-service-mesh/proxyv2-rhel8FixedRHSA-2023:462511.08.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2217983envoy: HTTP/2 memory leak in nghttp2 codec

EPSS

Процентиль: 32%
0.00125
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.

CVSS3: 7.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 2 лет назад

Envoy is a cloud-native high-performance edge/middle/service proxy. En ...

suse-cvrf
больше 2 лет назад

Security update for nghttp2

suse-cvrf
больше 2 лет назад

Security update for nghttp2

EPSS

Процентиль: 32%
0.00125
Низкий

7.5 High

CVSS3