CVE-2024-45807Always-Incorrect Control Flow Implementation in Envoy

Severity
7.5HIGHNVD
EPSS
0.1%
top 76.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 20

Description

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release version 1.31.2. All users are advised to upgrade. There are no known workarounds for this issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDenvoyproxy/envoy1.31.01.31.2
CVEListV5envoyproxy/envoy>= 1.31.0, < 1.31.2

🔴Vulnerability Details

1
CVEList
oghttp2 crash on OnBeginHeadersForStream in envoy2024-09-19

📋Vendor Advisories

1
Red Hat
envoy: Oghttp2 crash on `OnBeginHeadersForStream`2024-09-20