Bug 1200406 - (CVE-2022-29228) VUL-0: CVE-2022-29228: envoy-proxy: oauth filter calls continueDecoding() from within decodeHeaders()
(CVE-2022-29228)
VUL-0: CVE-2022-29228: envoy-proxy: oauth filter calls continueDecoding() fro...
Status: RESOLVED INVALID
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.3
Other Other
: P5 - None : Normal (vote)
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/334103/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-06-10 07:46 UTC by Thomas Leroy
Modified: 2022-06-10 07:46 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2022-06-10 07:46:06 UTC
rh#2088740

The OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2088740
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29228
https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6
https://github.com/envoyproxy/envoy/commit/7ffda4e809dec74449ebc330cebb9d2f4ab61360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29228
Comment 1 Thomas Leroy 2022-06-10 07:46:37 UTC
oauth not supported in the version we ship, closing