CVE-2022-23606

Source
https://cve.org/CVERecord?id=CVE-2022-23606
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-23606.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-23606
Aliases
Downstream
Published
2022-02-22T22:20:13Z
Modified
2026-04-12T15:03:05.157153Z
Severity
  • 4.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Crash when a cluster is deleted in Envoy
Details

Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-674"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23606.json"
}
References

Affected packages

Git / github.com/envoyproxy/envoy

Affected ranges

Type
GIT
Repo
https://github.com/envoyproxy/envoy
Events

Affected versions

v1.*
v1.21.0

Database specific

vanir_signatures_modified
"2026-04-12T15:03:05Z"
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-23606.json"
vanir_signatures
[
    {
        "target": {
            "file": "source/common/tcp_proxy/tcp_proxy.h"
        },
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "245673340480709380475607110780385137708",
                "285494569074532567258474565032572094364",
                "121492910522987967398570563042373873103",
                "208903825150298770882316003860954195851"
            ]
        },
        "id": "CVE-2022-23606-097fed22",
        "source": "https://github.com/envoyproxy/envoy/commit/af50070ee60866874b0a9383daf9364e884ded22",
        "signature_type": "Line"
    },
    {
        "target": {
            "file": "test/integration/tcp_tunneling_integration_test.cc"
        },
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "222375982320279527150068471158201686244",
                "165738277750233846199418982723160704713",
                "44051101608002913249948422506083140770"
            ]
        },
        "id": "CVE-2022-23606-9c39651a",
        "source": "https://github.com/envoyproxy/envoy/commit/af50070ee60866874b0a9383daf9364e884ded22",
        "signature_type": "Line"
    },
    {
        "target": {
            "function": "Filter::onDownstreamEvent",
            "file": "source/common/tcp_proxy/tcp_proxy.cc"
        },
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 808.0,
            "function_hash": "296559161755360112084384558440136934044"
        },
        "id": "CVE-2022-23606-a6789e61",
        "source": "https://github.com/envoyproxy/envoy/commit/af50070ee60866874b0a9383daf9364e884ded22",
        "signature_type": "Function"
    },
    {
        "target": {
            "file": "source/common/tcp_proxy/tcp_proxy.cc"
        },
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "146243477446113422387021212725253250778",
                "48539946143607539866181123457421037495",
                "283468910120726656487263215273247794220",
                "32816829629574534818331468211218975208",
                "167487698232686579647343259536732486616",
                "18932793910309592312745692489877318569",
                "190222441294940987692714025372522320194",
                "233481120278761949454860284316900076892",
                "33182693539138785849824461743826464632",
                "238411867963402661331142337279192022640"
            ]
        },
        "id": "CVE-2022-23606-d54b575d",
        "source": "https://github.com/envoyproxy/envoy/commit/af50070ee60866874b0a9383daf9364e884ded22",
        "signature_type": "Line"
    },
    {
        "target": {
            "function": "Filter::onUpstreamEvent",
            "file": "source/common/tcp_proxy/tcp_proxy.cc"
        },
        "signature_version": "v1",
        "deprecated": false,
        "digest": {
            "length": 711.0,
            "function_hash": "63191530169222520921233896458439701262"
        },
        "id": "CVE-2022-23606-efb2c5e4",
        "source": "https://github.com/envoyproxy/envoy/commit/af50070ee60866874b0a9383daf9364e884ded22",
        "signature_type": "Function"
    }
]