Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-53270

Опубликовано: 18 дек. 2024
Источник: redhat
CVSS3: 7.5

Описание

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions sendOverloadError is going to assume the active request exists when envoy.load_shed_points.http1_server_abort_dispatch is configured. If active_request is nullptr, only onMessageBeginImpl() is called. However, the onMessageBeginImpl will directly return ok status if the stream is already reset leading to the nullptr reference. The downstream reset can actually happen during the H/2 upstream reset. As a result envoy may crash. This issue has been addressed in releases 1.32.3, 1.31.5, 1.30.9, and 1.29.12. Users are advised to upgrade. Users unable to upgrade may disable http1_server_abort_dispatch load shed point and/or use a high threshold.

A flaw was found in Envoy. In systems where http1_server_abort_dispatch is configured, Envoy does not properly handle the control flow during H1 stream resets. This can trigger a null pointer error and lead to an application crash.

Отчет

This vulnerability in Envoy Proxy is marked as important severity rather than moderate due to its ability to cause a null pointer dereference, leading to a complete crash of the proxy under specific conditions. As Envoy is commonly deployed in mission-critical roles such as a high-performance edge, middle, or service proxy, a crash can disrupt downstream and upstream communication, effectively bringing down services dependent on Envoy. The issue is exacerbated by its potential to occur during load shedding, a mechanism typically invoked during resource exhaustion, which is a critical time for maintaining service availability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2openshift-service-mesh/istio-cni-rhel8Affected
OpenShift Service Mesh 2openshift-service-mesh/pilot-rhel8Affected
OpenShift Service Mesh 2openshift-service-mesh/proxyv2-rhel8Affected
Red Hat OpenShift Service Mesh 2.6 for RHEL 9openshift-service-mesh/proxyv2-rhel9FixedRHSA-2025:105305.02.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-670
https://bugzilla.redhat.com/show_bug.cgi?id=2333091envoy: HTTP/1: sending overload crashes when the request is reset beforehand in envoy

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 года назад

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullptr, only onMessageBeginImpl() is called. However, the `onMessageBeginImpl` will directly return ok status if the stream is already reset leading to the nullptr reference. The downstream reset can actually happen during the H/2 upstream reset. As a result envoy may crash. This issue has been addressed in releases 1.32.3, 1.31.5, 1.30.9, and 1.29.12. Users are advised to upgrade. Users unable to upgrade may disable `http1_server_abort_dispatch` load shed point and/or use a high threshold.

CVSS3: 7.5
debian
около 1 года назад

Envoy is a cloud-native high-performance edge/middle/service proxy. In ...

CVSS3: 7.5
fstec
около 1 года назад

Уязвимость конфигурации envoy.load_shed_points.http1_server_abort_dispatch прокси-сервера Envoy, позволяющая нарушителю вызвать отказ в обслуживании

7.5 High

CVSS3