Skip to content

Commit 898d686

Browse files
1 parent 4d635a1 commit 898d686

2 files changed

Lines changed: 76 additions & 10 deletions

File tree

advisories/github-reviewed/2026/02/GHSA-fpj8-gq4v-p354/GHSA-fpj8-gq4v-p354.json

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fpj8-gq4v-p354",
4-
"modified": "2026-02-19T15:06:50Z",
4+
"modified": "2026-03-10T18:32:34Z",
55
"published": "2026-02-17T21:31:13Z",
66
"aliases": [
77
"CVE-2025-66614"
@@ -28,7 +28,7 @@
2828
"introduced": "11.0.0-M1"
2929
},
3030
{
31-
"fixed": "11.0.14"
31+
"fixed": "11.0.15"
3232
}
3333
]
3434
}
@@ -47,7 +47,7 @@
4747
"introduced": "10.1.0-M1"
4848
},
4949
{
50-
"fixed": "10.1.49"
50+
"fixed": "10.1.50"
5151
}
5252
]
5353
}
@@ -66,7 +66,7 @@
6666
"introduced": "0"
6767
},
6868
{
69-
"fixed": "9.0.112"
69+
"fixed": "9.0.113"
7070
}
7171
]
7272
}
@@ -85,7 +85,7 @@
8585
"introduced": "11.0.0-M1"
8686
},
8787
{
88-
"fixed": "11.0.14"
88+
"fixed": "11.0.15"
8989
}
9090
]
9191
}
@@ -104,7 +104,7 @@
104104
"introduced": "10.1.0-M1"
105105
},
106106
{
107-
"fixed": "10.1.49"
107+
"fixed": "10.1.50"
108108
}
109109
]
110110
}
@@ -123,7 +123,7 @@
123123
"introduced": "0"
124124
},
125125
{
126-
"fixed": "9.0.112"
126+
"fixed": "9.0.113"
127127
}
128128
]
129129
}
@@ -142,7 +142,7 @@
142142
"introduced": "11.0.0-M1"
143143
},
144144
{
145-
"fixed": "11.0.14"
145+
"fixed": "11.0.15"
146146
}
147147
]
148148
}
@@ -161,7 +161,7 @@
161161
"introduced": "10.1.0-M1"
162162
},
163163
{
164-
"fixed": "10.1.49"
164+
"fixed": "10.1.50"
165165
}
166166
]
167167
}
@@ -180,7 +180,7 @@
180180
"introduced": "0"
181181
},
182182
{
183-
"fixed": "9.0.112"
183+
"fixed": "9.0.113"
184184
}
185185
]
186186
}
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c23c-rp3m-vpg3",
4+
"modified": "2026-03-10T18:31:57Z",
5+
"published": "2026-03-10T18:31:57Z",
6+
"aliases": [
7+
"CVE-2026-26330"
8+
],
9+
"summary": "Envoy's global rate limit may crash when the response phase limit is enabled and the response phase request is failed directly",
10+
"details": "### Summary\n\nAt the rate limit filter, if we enabled the response phase limit with `apply_on_stream_done` in the rate limit configuration and the response phase limit request fails directly, it may crash Envoy.\n\n### Details\n\nWhen both the request phase limit and response phase limit are enabled, the safe gRPC client instance will be re-used for both the request phase request and response phase request.\n\nBut after the request phase request is done, the inner state of the request phase limit request in gRPC client is not cleaned up. When we send the second limit request at response phase, and the second limit request fails directly, we may access the previous request's inner state and result in crash.\n\n\n### PoC\n\nThis need to mock the network failure. But we have reproduced by unit test locally.\n\n### Impact\n\nThis only happens when both the request phase limit and response phase limit are enabled in the rate limit filter, and requires the request to rate limit service fails directly (For example, if from Envoy's perspective, no healthy endpoint for rate limit service may result the request fails directly). That's say, not easy to trigger this.\n\n### To workaround\n\nThis could be worked around by splitting the rate limit filter. That is, if there is a rate limit filter that contains normal rate limit configuration (request phase limit, without `apply_on_stream_done`) and also rate limit configuration with `apply_on_stream_done` (response phase limit). Splitting them into two rate limit filters and ensure one filter only contains normal rate limit configuration (without `apply_on_stream_done`), and one only contains rate limit configuration with `apply_on_stream_done` could avoid this problem. \n\n### Credit\n\nMandar Jog (mandarjog@gmail.com)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/envoyproxy/envoy"
22+
},
23+
"versions": [
24+
"1.37.0"
25+
]
26+
},
27+
{
28+
"package": {
29+
"ecosystem": "Go",
30+
"name": "github.com/envoyproxy/envoy"
31+
},
32+
"ranges": [
33+
{
34+
"type": "ECOSYSTEM",
35+
"events": [
36+
{
37+
"introduced": "1.36.0"
38+
},
39+
{
40+
"last_affected": "1.36.4"
41+
}
42+
]
43+
}
44+
]
45+
}
46+
],
47+
"references": [
48+
{
49+
"type": "WEB",
50+
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-c23c-rp3m-vpg3"
51+
},
52+
{
53+
"type": "PACKAGE",
54+
"url": "https://github.com/envoyproxy/envoy"
55+
}
56+
],
57+
"database_specific": {
58+
"cwe_ids": [
59+
"CWE-416"
60+
],
61+
"severity": "MODERATE",
62+
"github_reviewed": true,
63+
"github_reviewed_at": "2026-03-10T18:31:57Z",
64+
"nvd_published_at": null
65+
}
66+
}

0 commit comments

Comments
 (0)