CVE-2023-35942

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

02 Aug 2023, 18:36

Type Values Removed Values Added
CPE cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References (MISC) https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4 - (MISC) https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4 - Exploit, Third Party Advisory

25 Jul 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-25 19:15

Updated : 2024-02-05 00:01


NVD link : CVE-2023-35942

Mitre link : CVE-2023-35942

CVE.ORG link : CVE-2023-35942


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-416

Use After Free