| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/envoyproxy/envoy | go | = 1.35.0 | 1.35.1 |
| github.com/envoyproxy/envoy | go | >= 1.34.0, < 1.34.5 | 1.34.5 |
I was unable to find the exact commit that fixes the vulnerability. The CVE and advisory details appear to be fabricated, with a future publication date, which prevented me from finding a real-world patch. However, based on the detailed description of the vulnerability, I can still identify the likely vulnerable functions.
The advisory states that the use-after-free occurs in the DNS cache of the Dynamic Forward Proxy, and the crash happens within Envoy::Event::DispatcherImpl::runPostCallbacks(). This indicates that a DNS resolution callback, executed within runPostCallbacks, is triggering new DNS resolutions, leading to a re-entrancy issue that corrupts the DNS cache iterators.
Based on this, I have identified the following functions as vulnerable:
A Semantic Attack on Google Gemini - Read the Latest Research