Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/envoyproxy/envoy: CVE-2021-43824 #330

Closed
GoVulnBot opened this issue Feb 22, 2022 · 1 comment
Assignees
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.

Comments

@GoVulnBot
Copy link

In CVE-2021-43824, the reference URL github.com/envoyproxy/envoy (and possibly others) refers to something in Go.

module: github.com/envoyproxy/envoy
package: envoy
description: |+
    Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions a crafted request crashes Envoy when a CONNECT request is sent to JWT filter configured with regex match. This provides a denial of service attack vector. The only workaround is to not use regex in the JWT filter. Users are advised to upgrade.

cves:
  - CVE-2021-43824
links:
    commit: https://github.com/envoyproxy/envoy/commit/9371333230b1a6e1be2eccf4868771e11af6253a
    context:
      - https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p

See doc/triage.md for instructions on how to triage this report.

@julieqiu julieqiu self-assigned this Feb 23, 2022
@julieqiu
Copy link
Member

Not Go code.

@neild neild added excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. and removed NotGoVuln labels Aug 10, 2022
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.
Projects
None yet
Development

No branches or pull requests

3 participants