Description
In certain conditions for Calico Typha (v3.26.2, v3.25.1 and below), and Calico Enterprise Typha (v3.17.1, v3.16.3, v3.15.3 and below), a client TLS handshake can block the Calico Typha server indefinitely, resulting in denial of service. The TLS Handshake() call is performed inside the main server handle for loop without any timeout allowing an unclean TLS handshake to block the main loop indefinitely while other connections will be idle waiting for that handshake to finish.
Published: 2023-11-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-2890 In certain conditions for Calico Typha (v3.26.2, v3.25.1 and below), and Calico Enterprise Typha (v3.17.1, v3.16.3, v3.15.3 and below), a client TLS handshake can block the Calico Typha server indefinitely, resulting in denial of service. The TLS Handshake() call is performed inside the main server handle for loop without any timeout allowing an unclean TLS handshake to block the main loop indefinitely while other connections will be idle waiting for that handshake to finish.
Github GHSA Github GHSA GHSA-5r5h-q934-cccp Calico Typha denial of service vulnerability
History

No history.

Subscriptions

Tigera Calico Cloud Calico Enterprise Calico Os
cve-icon MITRE

Status: PUBLISHED

Assigner: Tigera

Published:

Updated: 2024-09-05T13:40:37.794Z

Reserved: 2023-08-29T17:03:16.306Z

Link: CVE-2023-41378

cve-icon Vulnrichment

Updated: 2024-08-02T19:01:35.258Z

cve-icon NVD

Status : Modified

Published: 2023-11-06T16:15:42.273

Modified: 2024-11-21T08:21:11.240

Link: CVE-2023-41378

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses