Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-32974

Опубликовано: 04 июн. 2024
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

Envoy is a cloud-native, open source edge and service proxy. A crash was observed in EnvoyQuicServerStream::OnInitialHeadersComplete() with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after StopReading() being called on the stream. As after StopReading(), the HCM's ActiveStream might have already be destroyed and any up calls from QUICHE could potentially cause use after free.

A flaw was found in Envoy's QUIC stack. This flaw allows a remote, unauthenticated attacker to trigger an abnormal process termination, causing a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2openshift-service-mesh/proxyv2-rhel8Will not fix
OpenShift Service Mesh 2servicemesh-proxyWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400

EPSS

Процентиль: 8%
0.00028
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
больше 1 года назад

Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopReading()` being called on the stream. As after `StopReading()`, the HCM's `ActiveStream` might have already be destroyed and any up calls from QUICHE could potentially cause use after free.

CVSS3: 5.9
debian
больше 1 года назад

Envoy is a cloud-native, open source edge and service proxy. A crash w ...

EPSS

Процентиль: 8%
0.00028
Низкий

5.9 Medium

CVSS3

Уязвимость CVE-2024-32974