You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.
mend-for-github-combot
changed the title
CVE-2022-29228 (High) detected in envoy1.12.0-alpha.1, envoy1.12.0-alpha.1
CVE-2022-29228 (High) detected in envoy1.12.0-alpha.1, envoy1.12.0-alpha.1 - autoclosed
May 19, 2024
CVE-2022-29228 - High Severity Vulnerability
Vulnerable Libraries - envoy1.12.0-alpha.1, envoy1.12.0-alpha.1
Vulnerability Details
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.
Publish Date: 2022-06-09
URL: CVE-2022-29228
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-rww6-8h7g-8jf6
Release Date: 2022-06-09
Fix Resolution: v1.21.3,v1.22.1
The text was updated successfully, but these errors were encountered: