Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-33590 Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 23 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-23T18:17:53.066Z

Reserved: 2022-04-13T00:00:00.000Z

Link: CVE-2022-29228

cve-icon Vulnrichment

Updated: 2024-08-03T06:17:54.074Z

cve-icon NVD

Status : Modified

Published: 2022-06-09T20:15:08.197

Modified: 2024-11-21T06:58:45.850

Link: CVE-2022-29228

cve-icon Redhat

Severity : Important

Publid Date: 2022-06-09T14:00:00Z

Links: CVE-2022-29228 - Bugzilla

cve-icon OpenCVE Enrichment

No data.