BIT-envoy-2024-23323

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/envoy/BIT-envoy-2024-23323.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-envoy-2024-23323
Aliases
Published
2024-03-06T10:52:03.196Z
Modified
2024-10-08T04:11:58.666828Z
Summary
[none]
Details

Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Bitnami / envoy

Package

Name
envoy
Purl
pkg:bitnami/envoy

Severity

  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
1.26.0
Fixed
1.26.7
Introduced
1.27.0
Fixed
1.27.3
Introduced
1.28.0
Fixed
1.28.1
Introduced
1.29.0
Fixed
1.29.1