CVE-2024-32974Use After Free in Envoy

Severity
7.5HIGHNVD
EPSS
0.0%
top 94.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 4

Description

Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopReading()` being called on the stream. As after `StopReading()`, the HCM's `ActiveStream` might have already be destroyed and any up calls from QUICHE could potentially cause use after free.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDenvoyproxy/envoy1.28.01.28.4+3
CVEListV5envoyproxy/envoy1.27.5+3

📋Vendor Advisories

1
Red Hat
envoy: another QUIC stack DoS2024-06-04