Skip to content

x/vulndb: potential Go vuln in github.com/envoyproxy/envoy: CVE-2022-29228 #488

@GoVulnBot

Description

@GoVulnBot

CVE-2022-29228 references github.com/envoyproxy/envoy, which may be a Go module.

Description:
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.

Links:

See doc/triage.md for instructions on how to triage this report.

packages:
  - module: github.com/envoyproxy/envoy
    package: envoy
description: |
    Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.
cves:
  - CVE-2022-29228
links:
    commit: https://github.com/envoyproxy/envoy/commit/7ffda4e809dec74449ebc330cebb9d2f4ab61360
    context:
      - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6

Metadata

Metadata

Assignees

No one assigned

    Labels

    excluded: NOT_GO_CODEThis vulnerability does not refer to a Go module.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions