CVE-2024-32974
NixOS vulnerability analysis and mitigation

Overview

A use-after-free vulnerability was discovered in Envoy, a cloud-native open source edge and service proxy, identified as CVE-2024-32974. The vulnerability was found in the EnvoyQuicServerStream::OnInitialHeadersComplete() function, where QUICHE continues to push request headers after StopReading() is called on the stream. This can lead to potential use-after-free issues as the HCM's ActiveStream might have already been destroyed (GitHub Advisory).

Technical details

The vulnerability occurs when EnvoyQuicServerStream receives a request header referencing a new Qpack dynamic table entry that hasn't arrived yet, followed by a STOP_SENDING frame which triggers StopReading() to drop incoming requests and call HCM reset callback. The subsequent arrival of the Qpack dynamic table entry triggers OnInitialHeadersComplete(), attempting to access the already destroyed HCM ActiveStream object. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 HIGH by NVD and 5.9 MEDIUM by GitHub (NVD).

Impact

The vulnerability affects Envoy users who have configured HTTP/3 downstream. When exploited, it can lead to application crashes due to use-after-free conditions, potentially affecting service availability (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in multiple versions of Envoy: 1.30.2, 1.29.5, 1.28.4, and 1.27.6. Users are advised to upgrade to these patched versions to address the security issue (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management