First published: Fri Feb 09 2024(Updated: )
Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen within the same interval. The crash occurs when the following are true: 1. hedge_on_per_try_timeout is enabled, 2. per_try_idle_timeout is enabled (it can only be done in configuration), 3. per-try-timeout is enabled, either through headers or configuration and its value is equal, or within the backoff interval of the per_try_idle_timeout. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | >=1.26.0<1.26.7 | |
Envoy Proxy | >=1.27.0<1.27.3 | |
Envoy Proxy | >=1.28.0<1.28.1 | |
Envoy Proxy | >=1.29.0<1.29.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23322 is classified as a critical vulnerability due to the potential crash of Envoy proxy under specific conditions.
To fix CVE-2024-23322, upgrade to a version of Envoy that is greater than 1.29.1, 1.28.1, 1.27.3, or 1.26.7.
CVE-2024-23322 affects Envoy versions from 1.26.0 to 1.26.7, from 1.27.0 to 1.27.3, from 1.28.0 to 1.28.1, and from 1.29.0 to 1.29.1.
The crash is triggered when both hedge_on_per_try_timeout and per_try_idle_timeout are enabled within the same time interval in Envoy's configuration.
A potential workaround for CVE-2024-23322 is to disable either hedge_on_per_try_timeout or per_try_idle_timeout to avoid the crash condition.