First published: Tue Jun 04 2024(Updated: )
Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | >=1.28.0<1.28.4 | |
Envoy Proxy | >=1.29.0<1.29.5 | |
Envoy Proxy | >=1.30.0<1.30.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-34363 is categorized as high due to the potential for crashes in Envoy caused by uncaught exceptions.
To fix CVE-2024-34363, upgrade Envoy to versions 1.28.4, 1.29.5, or 1.30.2 or later.
CVE-2024-34363 affects Envoy Proxy versions from 1.28.0 to 1.28.4, from 1.29.0 to 1.29.5, and from 1.30.0 to 1.30.2.
The vulnerability in CVE-2024-34363 is caused by the nlohmann JSON library throwing uncaught exceptions when handling incomplete UTF-8 strings.
There is no specific workaround for CVE-2024-34363; updating Envoy to a fixed version is recommended.