Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/envoyproxy/envoy: CVE-2021-43826 #332

Closed
GoVulnBot opened this issue Feb 22, 2022 · 1 comment
Assignees
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.

Comments

@GoVulnBot
Copy link

In CVE-2021-43826, the reference URL github.com/envoyproxy/envoy (and possibly others) refers to something in Go.

module: github.com/envoyproxy/envoy
package: envoy
description: |
    Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions of Envoy a crash occurs when configured for :ref:`upstream tunneling <envoy_v3_api_field_extensions.filters.network.tcp_proxy.v3.TcpProxy.tunneling_config>` and the downstream connection disconnects while the the upstream connection or http/2 stream is still being established. There are no workarounds for this issue. Users are advised to upgrade.
cves:
  - CVE-2021-43826
links:
    commit: https://github.com/envoyproxy/envoy/commit/ce0ae309057a216aba031aff81c445c90c6ef145
    context:
      - https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf

See doc/triage.md for instructions on how to triage this report.

@julieqiu julieqiu self-assigned this Feb 23, 2022
@julieqiu
Copy link
Member

Not Go code.

@neild neild added excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. and removed NotGoVuln labels Aug 10, 2022
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.
Projects
None yet
Development

No branches or pull requests

3 participants