You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving RST_STREAM immediately followed by the GOAWAY frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the GOAWAY frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to GOAWAY frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
CVE-2023-35945 - High Severity Vulnerability
Vulnerable Library - nghttp2v1.41.0
nghttp2 - HTTP/2 C Library and tools
Library home page: https://github.com/nghttp2/nghttp2.git
Found in HEAD commit: 00fdb00d5bdbaea4fec4642989374d82cbdb1a3c
Found in base branch: master
Vulnerable Source Files (2)
/deps/nghttp2/lib/nghttp2_session.c
/deps/nghttp2/lib/nghttp2_session.c
Vulnerability Details
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving
RST_STREAM
immediately followed by theGOAWAY
frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of theGOAWAY
frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due toGOAWAY
frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.Publish Date: 2023-07-13
URL: CVE-2023-35945
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2023-07-13
Fix Resolution: v1.55.1
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: