Bug 1221398 (CVE-2024-27919) - VUL-0: CVE-2024-27919: envoy: HTTP/2 CONTINUATION frames can be utilized for DoS attacks
Summary: VUL-0: CVE-2024-27919: envoy: HTTP/2 CONTINUATION frames can be utilized for ...
Status: RESOLVED FIXED
Alias: CVE-2024-27919
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/397667/
Whiteboard:
Keywords:
Depends on:
Blocks: 1221404
  Show dependency treegraph
 
Reported: 2024-03-14 12:40 UTC by SMASH SMASH
Modified: 2024-04-04 07:10 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-03-14 12:40:47 UTC
CVE: CVE-2024-27919
ID: VU#421644.7
Case: VU#421644: HTTP/2 CONTINUATION frames can be utilized for DoS attacks
Date Added: 2024-03-14
Description: HTTP/2 CONTINUATION frames without the END_HEADERS flag set can be sent in a continuous stream by an attacker to a target implementation running Envoy, which will not properly append header information in memory, causing an OOM crash.
Comment 1 Marcus Meissner 2024-03-14 12:51:27 UTC
CRD: 2024-03-28
Comment 5 Marcus Meissner 2024-03-26 12:39:50 UTC
CRD: 2024-04-04
Comment 6 Marcus Meissner 2024-04-04 07:10:09 UTC
is public 
https://kb.cert.org/vuls/id/421644
Comment 7 Marcus Meissner 2024-04-04 07:10:28 UTC
we are not shippig envoy anymore