Envoy Proxy Crashes due to HTTP Async Client Issues
CVE-2024-45810
What is CVE-2024-45810?
A vulnerability has been identified in the Envoy cloud-native high-performance edge/middle/service proxy, leading to potential system crashes under specific conditions, such as websocket upgrades and request mirroring scenarios. This flaw stems from the improper handling of the sendLocalReply() method within the HTTP asynchronous client. Issues arise when the status code is duplicated, coupled with inappropriate destruction of the router during the async stream's lifecycle, which results in a segmentation fault. This confrontation compromises the functioning of ext_authz when upgrade and connection headers are utilized. Users are strongly advised to upgrade to fixed versions: 1.31.2, 1.30.6, 1.29.9, or 1.28.7 as no workarounds are available.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
envoy < 1.28.7 < 1.28.7
envoy >= 1.29.0, < 1.29.9 < 1.29.0, 1.29.9
envoy >= 1.30.0, < 1.30.6 < 1.30.0, 1.30.6
References
CVSS V3.1
Timeline
Vulnerability published
