First published: Tue Jun 04 2024(Updated: )
Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::PeekVarInt62Length()`. It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | <1.27.6 | |
Envoy Proxy | >=1.28.0<1.28.4 | |
Envoy Proxy | >=1.29.0<1.29.5 | |
Envoy Proxy | >=1.30.0<1.30.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32975 has been classified as a high severity vulnerability due to the potential for crashes in affected systems.
To remediate CVE-2024-32975, upgrade Envoy Proxy to version 1.27.7 or later, or to version 1.28.5 or later, depending on your current version.
CVE-2024-32975 affects Envoy Proxy versions up to 1.27.6 and versions between 1.28.0 to 1.28.4, 1.29.0 to 1.29.5, and 1.30.0 to 1.30.2.
CVE-2024-32975 leverages an integer underflow vulnerability within the PeekRegion implementation in the QuicStreamSequencerBuffer.
Yes, CVE-2024-32975 could potentially be exploited remotely, leading to application crashes.