CVE-2023-35945
CVSS V2 None
CVSS V3 None
Description
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
Overview
- CVE ID
- CVE-2023-35945
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-07-13T20:41:15.690Z
- Last Modified Date
- 2023-07-13T20:41:15.690Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r | x_refsource_CONFIRM |
https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-35945 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35945 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 19:42:22 | Added to TrackCVE |