CVE-2024-53270Always-Incorrect Control Flow Implementation in Envoy

Severity
7.5HIGHNVD
EPSS
0.0%
top 93.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 18

Description

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullptr, only onMessageBeginImpl() is called. However, the `onMessageBeginImpl` will directly return ok status if the stream is already reset leading to the nullptr reference. The downstream reset can actually happen during the H/2 upstream reset. As

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5envoyproxy/envoy< 1.29.12+3
NVDenvoyproxy/envoy1.30.01.30.9+3

Patches

🔴Vulnerability Details

1
CVEList
HTTP/1: sending overload crashes when the request is reset beforehand in envoy2024-12-18

📋Vendor Advisories

1
Red Hat
envoy: HTTP/1: sending overload crashes when the request is reset beforehand in envoy2024-12-18