First published: Tue Jun 04 2024(Updated: )
Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | <1.27.6 | |
Envoy Proxy | >=1.28.0<1.28.4 | |
Envoy Proxy | >=1.29.0<1.29.5 | |
Envoy Proxy | >=1.30.0<1.30.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34364 has a medium severity rating due to the potential for out-of-memory (OOM) errors.
To fix CVE-2024-34364, you should update Envoy Proxy to version 1.27.6 or later, or any version between 1.28.0 and 1.28.4, or any version between 1.29.0 and 1.29.5, or any version between 1.30.0 and 1.30.2.
CVE-2024-34364 is caused by an out-of-memory error resulting from the async HTTP client buffering responses with an unbounded buffer.
Affected versions of Envoy Proxy include all versions prior to 1.27.6 and versions from 1.28.0 up to 1.28.4, from 1.29.0 up to 1.29.5, and from 1.30.0 up to 1.30.2.
Currently, there is no documented workaround for CVE-2024-34364, and upgrading to a patched version is the recommended solution.