Bug 2259232 (CVE-2024-23323)

Summary: CVE-2024-23323 envoy: Excessive CPU usage when URI template matcher is configured using regex
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jobselko, jwendell, rcernich, security-response-team, twalsh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: envoy proxy 1.29.1, envoy proxy 1.28.1, envoy proxy 1.27.3, envoy proxy 1.26.7 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Envoy proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2259221    

Description Patrick Del Bello 2024-01-19 16:25:59 UTC
Excessive CPU usage when URI template matcher is configured using regex