Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/envoyproxy/envoy: CVE-2024-32976 #2894

Closed
tatianab opened this issue Jun 7, 2024 · 1 comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. triaged

Comments

@tatianab
Copy link
Contributor

tatianab commented Jun 7, 2024

CVE-2024-32976 references github.com/envoyproxy/envoy, which may be a Go module.

Description:
Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/envoyproxy/envoy
      vulnerable_at: 1.30.2
      packages:
        - package: envoy
summary: CVE-2024-32976 in github.com/envoyproxy/envoy
cves:
    - CVE-2024-32976
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32976
    - web: https://github.com/envoyproxy/envoy/security/advisories/GHSA-7wp5-c2vq-4f8m
source:
    id: CVE-2024-32976
    created: 2024-06-07T17:17:53.697775-04:00
review_status: UNREVIEWED

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/592765 mentions this issue: data/excluded,data/reports: add 10 reports

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. triaged
Projects
None yet
Development

No branches or pull requests

2 participants