Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-27919

Опубликовано: 03 апр. 2024
Источник: redhat
CVSS3: 7.5
EPSS Средний

Описание

Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have been exceeded. This allows an attacker to send an sequence of CONTINUATION frames without the END_HEADERS bit set causing unlimited memory consumption. This can lead to denial of service through memory exhaustion. Users should upgrade to versions 1.29.2 to mitigate the effects of the CONTINUATION flood. Note that this vulnerability is a regression in Envoy version 1.29.0 and 1.29.1 only. As a workaround, downgrade to version 1.28.1 or earlier or disable HTTP/2 protocol for downstream connections.

A vulnerability was found in how Envoy Proxy implements the oghttp codec. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up memory resources to cause a Denial of Service.

Отчет

No Red Hat products ship a vulnerable version of Envoy.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler/custom-metrics-autoscaler-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Logical Volume Manager Storagelvms4/topolvm-rhel9Not affected
Migration Toolkit for Applications 6mta/mta-hub-rhel8Not affected
Migration Toolkit for Containersrhmtc/openshift-migration-velero-plugin-for-gcp-rhel8Not affected
OpenShift API for Data Protectionoadp/oadp-velero-plugin-for-gcp-rhel9Not affected
OpenShift API for Data Protectionoadp/oadp-velero-rhel8Not affected
OpenShift Serverlessopenshift-serverless-1/eventing-mtping-rhel8Not affected
OpenShift Service Mesh 2openshift-service-mesh/istio-cni-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-grafana-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2269444envoy: CONTINUATION frames which enable DoS

EPSS

Процентиль: 98%
0.49159
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 года назад

Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have been exceeded. This allows an attacker to send an sequence of CONTINUATION frames without the END_HEADERS bit set causing unlimited memory consumption. This can lead to denial of service through memory exhaustion. Users should upgrade to versions 1.29.2 to mitigate the effects of the CONTINUATION flood. Note that this vulnerability is a regression in Envoy version 1.29.0 and 1.29.1 only. As a workaround, downgrade to version 1.28.1 or earlier or disable HTTP/2 protocol for downstream connections.

CVSS3: 7.5
debian
около 1 года назад

Envoy is a cloud-native, open-source edge and service proxy. In versio ...

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость oghttp-кодека прокси-сервера Envoy, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
11 месяцев назад

Уязвимость consul

EPSS

Процентиль: 98%
0.49159
Средний

7.5 High

CVSS3