CVE Vulnerabilities

CVE-2024-23327

NULL Pointer Dereference

Published: Feb 09, 2024 | Modified: Feb 15, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu

Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does not have the protocol block. This issue has been addressed in releases 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Envoy Envoyproxy 1.26.0 (including) 1.26.7 (excluding)
Envoy Envoyproxy 1.27.0 (including) 1.27.3 (excluding)
Envoy Envoyproxy 1.28.0 (including) 1.28.1 (excluding)
Envoy Envoyproxy 1.29.0 (including) 1.29.1 (excluding)

Potential Mitigations

References