Bug ID 1223176
Summary VUL-0: CVE-2024-32475: envoy: abnormal termination when using auto_sni with authority header longer than 255 characters
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/402625/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee wolfgang.engel@suse.com
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC stoyan.manolov@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Envoy is a cloud-native, open source edge and service proxy. When an upstream
TLS cluster is used with `auto_sni` enabled, a request containing a
`host`/`:authority` header longer than 255 characters triggers an abnormal
termination of Envoy process. Envoy does not gracefully handle an error when
setting SNI for outbound TLS connection. The error can occur when Envoy
attempts to use the `host`/`:authority` header value longer than 255 characters
as SNI for outbound TLS connection. SNI length is limited to 255 characters per
the standard. Envoy always expects this operation to succeed and abnormally
aborts the process when it fails. This vulnerability is fixed in 1.30.1,
1.29.4, 1.28.3, and 1.27.5.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-32475
https://www.cve.org/CVERecord?id=CVE-2024-32475
https://github.com/envoyproxy/envoy/commit/b47fc6648d7c2dfe0093a601d44cb704b7bad382
https://github.com/envoyproxy/envoy/security/advisories/GHSA-3mh5-6q8v-25wj
https://bugzilla.redhat.com/show_bug.cgi?id=2276149


You are receiving this mail because: