Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-07-13T20:41:15.690Z

Updated: 2024-08-02T16:37:40.544Z

Reserved: 2023-06-20T14:02:45.597Z

Link: CVE-2023-35945

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-07-13T21:15:08.880

Modified: 2023-10-24T17:26:30.973

Link: CVE-2023-35945

cve-icon Redhat

Severity : Important

Publid Date: 2023-07-13T00:00:00Z

Links: CVE-2023-35945 - Bugzilla