Bug 1196420 - (CVE-2021-43826) VUL-0: CVE-2021-43826: envoy-proxy: Use-after-free when tunneling TCP over HTTP
(CVE-2021-43826)
VUL-0: CVE-2021-43826: envoy-proxy: Use-after-free when tunneling TCP over HTTP
Status: NEW
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.3
Other Other
: P3 - Medium : Normal (vote)
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/324521/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-02-24 09:37 UTC by Carlos López
Modified: 2022-08-01 13:07 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Dirk Mueller 2022-05-10 11:06:58 UTC
I'm not maintaining envoy-proxy and as far as I can see we're not shipping it anywhere. close?
Comment 2 Carlos López 2022-05-10 11:09:47 UTC
As with the other envoy-proxy bugs, reassigning to the appropriate maintainer.
Comment 3 Ludwig Nussel 2022-08-01 13:07:31 UTC
No idea why this got assigned to me. I have nothing to do with this package.