Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Envoy vulnerable to HTTP/2 memory leak in nghttp2 codec
Vulnerability Description
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
Envoy 资源管理错误漏洞
Vulnerability Description
Envoy是一款开源的分布式代理服务器。 Envoy 1.27.0之前版本存在资源管理错误漏洞,该漏洞源于Envoy 的 HTTP/2 编解码器在收到来自上游服务器的帧RST_STREAM后,可能会泄漏header map和bookkeeping structures。
CVSS Information
N/A
Vulnerability Type
N/A