First published: Fri Feb 04 2022(Updated: )
A flaw was found in envoy. If the amount of buffered data by envoy goes over the limit, the buffer may overflow while a response is being processed by the filter chain. This issue possibly causes the operation to abort incorrectly, resulting in the access of a freed memory block.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/servicemesh-proxy | <0:2.0.9-3.el8 | 0:2.0.9-3.el8 |
redhat/servicemesh-proxy | <0:2.1.2-4.el8 | 0:2.1.2-4.el8 |
Envoyproxy Envoy | <1.18.6 | |
Envoyproxy Envoy | >=1.19.0<1.19.3 | |
Envoyproxy Envoy | >=1.20.0<1.20.2 | |
Envoyproxy Envoy | >=1.21.0<1.21.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43825 is a vulnerability found in Envoy, an open-source edge and service proxy, that allows an attacker to cause a denial-of-service (DoS) condition by sending a large amount of buffered request and response data.
The severity of CVE-2021-43825 is high, with a severity score of 7.5.
CVE-2021-43825 affects the following software versions: servicemesh-proxy 0:2.0.9-3.el8, servicemesh-proxy 0:2.1.2-4.el8, envoy 1.18.6, envoy 1.19.3, envoy 1.20.2, and envoy 1.21.1.
To fix the CVE-2021-43825 vulnerability, update affected software versions to the recommended or later versions: servicemesh-proxy 0:2.0.9-3.el8, servicemesh-proxy 0:2.1.2-4.el8, envoy 1.18.6, envoy 1.19.3, envoy 1.20.2, and envoy 1.21.1.
More information about CVE-2021-43825 can be found on the following references: [Red Hat Advisory RHSA-2022:1276](https://access.redhat.com/errata/RHSA-2022:1276), [Red Hat Advisory RHSA-2022:1275](https://access.redhat.com/errata/RHSA-2022:1275), and [CVE-2021-43825](https://access.redhat.com/security/cve/cve-2021-43825).