CVE-2024-23322

Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen within the same interval. The crash occurs when the following are true: 1. hedge_on_per_try_timeout is enabled, 2. per_try_idle_timeout is enabled (it can only be done in configuration), 3. per-try-timeout is enabled, either through headers or configuration and its value is equal, or within the backoff interval of the per_try_idle_timeout. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:57

Type Values Removed Values Added
References () https://github.com/envoyproxy/envoy/commit/843f9e6a123ed47ce139b421c14e7126f2ac685e - Patch, Vendor Advisory () https://github.com/envoyproxy/envoy/commit/843f9e6a123ed47ce139b421c14e7126f2ac685e - Patch, Vendor Advisory
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-6p83-mfmh-qv38 - Vendor Advisory () https://github.com/envoyproxy/envoy/security/advisories/GHSA-6p83-mfmh-qv38 - Vendor Advisory

15 Feb 2024, 04:48

Type Values Removed Values Added
References () https://github.com/envoyproxy/envoy/commit/843f9e6a123ed47ce139b421c14e7126f2ac685e - () https://github.com/envoyproxy/envoy/commit/843f9e6a123ed47ce139b421c14e7126f2ac685e - Patch, Vendor Advisory
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-6p83-mfmh-qv38 - () https://github.com/envoyproxy/envoy/security/advisories/GHSA-6p83-mfmh-qv38 - Vendor Advisory
CPE cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
Summary
  • (es) Envoy es un proxy de servicio/intermedio/perimetral de alto rendimiento. Envoy se bloqueará cuando se produzcan ciertos tiempos de espera dentro del mismo intervalo. El bloqueo ocurre cuando se cumple lo siguiente: 1. hedge_on_per_try_timeout está habilitado, 2. per_try_idle_timeout está habilitado (solo se puede hacer en la configuración), 3. per-try-timeout está habilitado, ya sea a través de encabezados o configuración y su valor es igual , o dentro del intervalo de espera de per_try_idle_timeout. Este problema se solucionó en las versiones 1.29.1, 1.28.1, 1.27.3 y 1.26.7. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.
First Time Envoyproxy
Envoyproxy envoy

09 Feb 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 23:15

Updated : 2024-11-21 08:57


NVD link : CVE-2024-23322

Mitre link : CVE-2024-23322

CVE.ORG link : CVE-2024-23322


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-416

Use After Free