CVE-2022-29228
09.06.2022, 20:15
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldnt ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.Enginsight
Vendor | Product | Version |
---|---|---|
envoyproxy | envoy | 𝑥 < 1.22.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-617 - Reachable AssertionThe product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
- CWE-416 - Use After FreeReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
References