First published: Fri May 24 2024(Updated: )
Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/envoy | <1.30.2 | 1.30.2 |
redhat/envoy | <1.29.5 | 1.29.5 |
redhat/envoy | <1.27.6 | 1.27.6 |
Envoy Proxy | >=1.18.0<1.27.6 | |
Envoy Proxy | >=1.28.0<1.28.4 | |
Envoy Proxy | >=1.29.0<1.29.5 | |
Envoy Proxy | >=1.30.0<1.30.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32976 has a high severity due to the potential for denial of service caused by an infinite loop during Brotli data decompression.
To remediate CVE-2024-32976, upgrade to Envoy version 1.30.2, 1.29.5, or 1.27.6, as those versions have addressed the vulnerability.
CVE-2024-32976 affects Envoy versions between 1.18.0 and 1.30.2, specifically excluding the patched versions.
The impact of CVE-2024-32976 is that it can cause an endless loop, leading to a denial of service in systems utilizing the affected versions of Envoy.
As of now, there are no publicly disclosed exploits for CVE-2024-32976, but organizations are advised to patch as a precaution.