Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/envoyproxy/envoy: CVE-2023-35945 #1917

Closed
GoVulnBot opened this issue Jul 13, 2023 · 1 comment
Closed
Assignees
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.

Comments

@GoVulnBot
Copy link

CVE-2023-35945 references github.com/envoyproxy/envoy, which may be a Go module.

Description:
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving RST_STREAM immediately followed by the GOAWAY frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the GOAWAY frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to GOAWAY frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/envoyproxy/envoy
      vulnerable_at: 1.26.2
      packages:
        - package: envoy
description: |-
    Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s
    HTTP/2 codec may leak a header map and bookkeeping structures upon receiving
    `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream
    server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY`
    frame skips de-allocation of the bookkeeping structure and pending compressed
    header. The error return [code path] is taken if connection is already marked
    for not sending more requests due to `GOAWAY` frame. The clean-up code is right
    after the return statement, causing memory leak. Denial of service through
    memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8,
    1.24.9, 1.23.11.
cves:
    - CVE-2023-35945
references:
    - advisory: https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r
    - web: https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346

@neild neild added the excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. label Jul 25, 2023
@neild neild self-assigned this Jul 25, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/513195 mentions this issue: data/excluded: batch add 26 excluded reports

This was referenced Nov 8, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.
Projects
None yet
Development

No branches or pull requests

3 participants