Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2023-35945

Public on 2023-07-13
Modified on 2023-08-10
Description

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.

Severity
Important
See what this means
CVSS v3 Base Score
7.5
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 2 - Ecs Extra ecs-service-connect-agent 2023-08-17 17:04 ALAS2ECS-2023-006
Amazon Linux 2023 ecs-service-connect-agent 2023-08-17 11:20 ALAS2023-2023-300
Amazon Linux 1 nghttp2 2023-08-03 20:16 ALAS-2023-1793
Amazon Linux 2 - Core nghttp2 2023-08-03 18:09 ALAS2-2023-2180
Amazon Linux 2023 nghttp2 2023-08-03 20:26 ALAS2023-2023-278
Amazon Linux 2023 nodejs 2023-08-03 20:26 ALAS2023-2023-290

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NVD CVSSv3 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H