CVE-2023-35945

Name
CVE-2023-35945
Description
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346
MISC https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* envoy >= 1.26.0 < 1.26.3
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* envoy >= 1.25.0 < 1.25.8
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* envoy >= 1.24.0 < 1.24.9
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* envoy >= None < 1.23.11

Vulnerable and fixed packages

Source package Branch Version Maintainer Status