Bitnami package
envoy
pkg:bitnami/envoy
Vulnerabilities (86)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-45809 | — | >= 1.29.0, < 1.29.9 | 1.29.9 | Sep 19, 2024 | Envoy is a cloud-native high-performance edge/middle/service proxy. Jwt filter will lead to an Envoy crash when clear route cache with remote JWKs. In the following case: 1. remote JWKs are used, which requires async header processing; 2. clear_route_cache is enabled on the provi | ||
| CVE-2024-45810 | — | < 1.31.2 | 1.31.2 | Sep 19, 2024 | Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling `sendLocalReply` under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the `sendLocalReply()` in | ||
| CVE-2024-39305 | — | < 1.27.7 | 1.27.7 | Jul 1, 2024 | Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the eff | ||
| CVE-2024-32974 | — | < 1.27.6 | 1.27.6 | Jun 4, 2024 | Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopReading()` being called on the st | ||
| CVE-2024-32975 | — | < 1.27.6 | 1.27.6 | Jun 4, 2024 | Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::PeekVarInt62Length()`. It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation. | ||
| CVE-2024-32976 | — | >= 1.18.0, < 1.27.6 | 1.27.6 | Jun 4, 2024 | Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input. | ||
| CVE-2024-34362 | — | < 1.27.6 | 1.27.6 | Jun 4, 2024 | Envoy is a cloud-native, open source edge and service proxy. There is a use-after-free in `HttpConnectionManager` (HCM) with `EnvoyQuicServerStream` that can crash Envoy. An attacker can exploit this vulnerability by sending a request without `FIN`, then a `RESET_STREAM` frame, a | ||
| CVE-2024-34363 | — | >= 1.28.0, < 1.28.4 | 1.28.4 | Jun 4, 2024 | Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash. | ||
| CVE-2024-34364 | — | < 1.27.6 | 1.27.6 | Jun 4, 2024 | Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer. | ||
| CVE-2024-23326 | — | < 1.27.6 | 1.27.6 | Jun 4, 2024 | Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101 | ||
| CVE-2024-32475 | — | >= 1.13.0, < 1.27.5 | 1.27.5 | Apr 18, 2024 | Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process. Envoy does not gracefully han | ||
| CVE-2024-30255 | — | < 1.26.8 | 1.26.8 | Apr 4, 2024 | Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited n | ||
| CVE-2024-27919 | — | >= 1.29.0, < 1.29.2 | 1.29.2 | Apr 4, 2024 | Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have been exceeded. This allows an at | ||
| CVE-2024-23322 | — | >= 1.26.0, < 1.26.7 | 1.26.7 | Feb 9, 2024 | Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen within the same interval. The crash occurs when the following are true: 1. hedge_on_per_try_timeout is enabled, 2. per_try_idle_timeout is enabled (it can only be done in configur | ||
| CVE-2024-23323 | — | >= 1.26.0, < 1.26.7 | 1.26.7 | Feb 9, 2024 | Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers. This issue has been addressed in released 1.29.1, 1.28. | ||
| CVE-2024-23324 | — | >= 1.26.0, < 1.26.7 | 1.26.7 | Feb 9, 2024 | Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue | ||
| CVE-2024-23325 | — | >= 1.26.0, < 1.26.7 | 1.26.7 | Feb 9, 2024 | Envoy is a high-performance edge/middle/service proxy. Envoy crashes in Proxy protocol when using an address type that isn’t supported by the OS. Envoy is susceptible to crashing on a host with IPv6 disabled and a listener config with proxy protocol enabled when it receives a req | ||
| CVE-2024-23327 | — | >= 1.26.0, < 1.26.7 | 1.26.7 | Feb 9, 2024 | Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does | ||
| CVE-2023-44487 | Hig | 7.5 | KEV | < 1.24.12 | 1.24.12 | Oct 10, 2023 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
| CVE-2023-35944 | — | >= 1.23.0, < 1.23.12 | 1.23.12 | Jul 25, 2023 | Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejectio |
- CVE-2024-45809Sep 19, 2024affected >= 1.29.0, < 1.29.9fixed 1.29.9
Envoy is a cloud-native high-performance edge/middle/service proxy. Jwt filter will lead to an Envoy crash when clear route cache with remote JWKs. In the following case: 1. remote JWKs are used, which requires async header processing; 2. clear_route_cache is enabled on the provi
- CVE-2024-45810Sep 19, 2024affected < 1.31.2fixed 1.31.2
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling `sendLocalReply` under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the `sendLocalReply()` in
- CVE-2024-39305Jul 1, 2024affected < 1.27.7fixed 1.27.7
Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the eff
- CVE-2024-32974Jun 4, 2024affected < 1.27.6fixed 1.27.6
Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopReading()` being called on the st
- CVE-2024-32975Jun 4, 2024affected < 1.27.6fixed 1.27.6
Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::PeekVarInt62Length()`. It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation.
- CVE-2024-32976Jun 4, 2024affected >= 1.18.0, < 1.27.6fixed 1.27.6
Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input.
- CVE-2024-34362Jun 4, 2024affected < 1.27.6fixed 1.27.6
Envoy is a cloud-native, open source edge and service proxy. There is a use-after-free in `HttpConnectionManager` (HCM) with `EnvoyQuicServerStream` that can crash Envoy. An attacker can exploit this vulnerability by sending a request without `FIN`, then a `RESET_STREAM` frame, a
- CVE-2024-34363Jun 4, 2024affected >= 1.28.0, < 1.28.4fixed 1.28.4
Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash.
- CVE-2024-34364Jun 4, 2024affected < 1.27.6fixed 1.27.6
Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer.
- CVE-2024-23326Jun 4, 2024affected < 1.27.6fixed 1.27.6
Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101
- CVE-2024-32475Apr 18, 2024affected >= 1.13.0, < 1.27.5fixed 1.27.5
Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process. Envoy does not gracefully han
- CVE-2024-30255Apr 4, 2024affected < 1.26.8fixed 1.26.8
Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited n
- CVE-2024-27919Apr 4, 2024affected >= 1.29.0, < 1.29.2fixed 1.29.2
Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have been exceeded. This allows an at
- CVE-2024-23322Feb 9, 2024affected >= 1.26.0, < 1.26.7fixed 1.26.7
Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen within the same interval. The crash occurs when the following are true: 1. hedge_on_per_try_timeout is enabled, 2. per_try_idle_timeout is enabled (it can only be done in configur
- CVE-2024-23323Feb 9, 2024affected >= 1.26.0, < 1.26.7fixed 1.26.7
Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers. This issue has been addressed in released 1.29.1, 1.28.
- CVE-2024-23324Feb 9, 2024affected >= 1.26.0, < 1.26.7fixed 1.26.7
Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue
- CVE-2024-23325Feb 9, 2024affected >= 1.26.0, < 1.26.7fixed 1.26.7
Envoy is a high-performance edge/middle/service proxy. Envoy crashes in Proxy protocol when using an address type that isn’t supported by the OS. Envoy is susceptible to crashing on a host with IPv6 disabled and a listener config with proxy protocol enabled when it receives a req
- CVE-2024-23327Feb 9, 2024affected >= 1.26.0, < 1.26.7fixed 1.26.7
Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does
- affected < 1.24.12fixed 1.24.12
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
- CVE-2023-35944Jul 25, 2023affected >= 1.23.0, < 1.23.12fixed 1.23.12
Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejectio
Page 2 of 5