-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/envoyproxy/envoy | go | ||
| github.com/envoyproxy/envoy | go | ||
| github.com/envoyproxy/envoy | go | ||
| github.com/envoyproxy/envoy | go |
The vulnerability stems from two key issues: 1) The router filter didn't properly reset upstream requests during local replies (CWE-460 cleanup failure), and 2) The ext_proc filter continued processing after local reply generation when its state was invalid. The commit adds 'resetAll()' in router.h and 'processing_complete_' handling in ext_proc.h to address these issues. Both functions were directly modified in the security patch, and their pre-patch versions clearly match the described vulnerability mechanics (lifetime issues during WebSocket failures).