First published: Thu Sep 19 2024(Updated: )
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release version 1.31.2. All users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | >=1.31.0<1.31.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45807 is classified as a high severity vulnerability due to potential bugs in stream management.
To resolve CVE-2024-45807, update Envoy Proxy to a version beyond 1.31.2, where the 'oghttp2' codec is disabled by default.
CVE-2024-45807 affects Envoy Proxy versions 1.31.0 to 1.31.2.
The impact of CVE-2024-45807 involves potential instability and disruptive behavior in stream management while using the oghttp codec.
Yes, the permanent fix for CVE-2024-45807 involves upgrading to Envoy version 1.31.3 or later.