{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2019-18801","title":"Title"},{"category":"description","text":"An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-death scenario) or may be used to bypass Envoy's access control mechanisms such as path based routing. An attacker can also modify requests from other users that happen to be proximal temporally and spatially.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2019-18801","url":"https://www.suse.com/security/cve/CVE-2019-18801"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1159002 for CVE-2019-18801","url":"https://bugzilla.suse.com/1159002"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:196-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:198-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:200-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:201-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:789-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:793-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2020:1573-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006902.html"}],"title":"SUSE CVE CVE-2019-18801","tracking":{"current_release_date":"2025-04-25T05:59:18Z","generator":{"date":"2023-02-15T04:06:53Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2019-18801","initial_release_date":"2023-02-15T04:06:53Z","revision_history":[{"date":"2023-02-15T04:06:53Z","number":"2","summary":"Current version"},{"date":"2025-01-01T06:12:00Z","number":"3","summary":"Current version"},{"date":"2025-02-15T06:49:53Z","number":"4","summary":"Current version"},{"date":"2025-02-17T07:15:06Z","number":"5","summary":"Current version"},{"date":"2025-03-15T10:29:07Z","number":"6","summary":"Current version"},{"date":"2025-04-25T05:59:18Z","number":"7","summary":"Current version"}],"status":"interim","version":"7"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE CaaS Platform 4.0","product":{"name":"SUSE CaaS Platform 4.0","product_id":"SUSE CaaS Platform 4.0","product_identification_helper":{"cpe":"cpe:/o:suse:caasp:4.0"}}},{"category":"product_version","name":"caasp-release-4.2.1-24.23.4","product":{"name":"caasp-release-4.2.1-24.23.4","product_id":"caasp-release-4.2.1-24.23.4","product_identification_helper":{"purl":"pkg:rpm/suse/caasp-release@4.2.1-24.23.4?upstream=caasp-release-4.2.1-24.23.4.src.rpm"}}},{"category":"product_version","name":"skuba-1.3.5-3.39.1","product":{"name":"skuba-1.3.5-3.39.1","product_id":"skuba-1.3.5-3.39.1","product_identification_helper":{"purl":"pkg:rpm/suse/skuba@1.3.5-3.39.1?upstream=skuba-1.3.5-3.39.1.src.rpm"}}},{"category":"product_version","name":"skuba-update-1.3.5-3.39.1","product":{"name":"skuba-update-1.3.5-3.39.1","product_id":"skuba-update-1.3.5-3.39.1","product_identification_helper":{"purl":"pkg:rpm/suse/skuba-update@1.3.5-3.39.1?upstream=skuba-1.3.5-3.39.1.src.rpm"}}},{"category":"product_version","name":"terraform-provider-vsphere-1.17.3-3.3.4","product":{"name":"terraform-provider-vsphere-1.17.3-3.3.4","product_id":"terraform-provider-vsphere-1.17.3-3.3.4","product_identification_helper":{"purl":"pkg:rpm/suse/terraform-provider-vsphere@1.17.3-3.3.4?upstream=terraform-provider-vsphere-1.17.3-3.3.4.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"caasp-release-4.2.1-24.23.4 as component of SUSE CaaS Platform 4.0","product_id":"SUSE CaaS Platform 4.0:caasp-release-4.2.1-24.23.4"},"product_reference":"caasp-release-4.2.1-24.23.4","relates_to_product_reference":"SUSE CaaS Platform 4.0"},{"category":"default_component_of","full_product_name":{"name":"skuba-1.3.5-3.39.1 as component of SUSE CaaS Platform 4.0","product_id":"SUSE CaaS Platform 4.0:skuba-1.3.5-3.39.1"},"product_reference":"skuba-1.3.5-3.39.1","relates_to_product_reference":"SUSE CaaS Platform 4.0"},{"category":"default_component_of","full_product_name":{"name":"skuba-update-1.3.5-3.39.1 as component of SUSE CaaS Platform 4.0","product_id":"SUSE CaaS Platform 4.0:skuba-update-1.3.5-3.39.1"},"product_reference":"skuba-update-1.3.5-3.39.1","relates_to_product_reference":"SUSE CaaS Platform 4.0"},{"category":"default_component_of","full_product_name":{"name":"terraform-provider-vsphere-1.17.3-3.3.4 as component of SUSE CaaS Platform 4.0","product_id":"SUSE CaaS Platform 4.0:terraform-provider-vsphere-1.17.3-3.3.4"},"product_reference":"terraform-provider-vsphere-1.17.3-3.3.4","relates_to_product_reference":"SUSE CaaS Platform 4.0"}]},"vulnerabilities":[{"cve":"CVE-2019-18801","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-18801"}],"notes":[{"category":"general","text":"An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-death scenario) or may be used to bypass Envoy's access control mechanisms such as path based routing. An attacker can also modify requests from other users that happen to be proximal temporally and spatially.","title":"CVE description"}],"product_status":{"recommended":["SUSE CaaS Platform 4.0:caasp-release-4.2.1-24.23.4","SUSE CaaS Platform 4.0:skuba-1.3.5-3.39.1","SUSE CaaS Platform 4.0:skuba-update-1.3.5-3.39.1","SUSE CaaS Platform 4.0:terraform-provider-vsphere-1.17.3-3.3.4"]},"references":[{"category":"external","summary":"CVE-2019-18801","url":"https://www.suse.com/security/cve/CVE-2019-18801"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1159002 for CVE-2019-18801","url":"https://bugzilla.suse.com/1159002"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:196-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:198-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:200-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:201-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:789-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html"},{"category":"external","summary":"Advisory link for SUSE-CU-2020:793-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2020:1573-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-June/006902.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE CaaS Platform 4.0:caasp-release-4.2.1-24.23.4","SUSE CaaS Platform 4.0:skuba-1.3.5-3.39.1","SUSE CaaS Platform 4.0:skuba-update-1.3.5-3.39.1","SUSE CaaS Platform 4.0:terraform-provider-vsphere-1.17.3-3.3.4"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE CaaS Platform 4.0:caasp-release-4.2.1-24.23.4","SUSE CaaS Platform 4.0:skuba-1.3.5-3.39.1","SUSE CaaS Platform 4.0:skuba-update-1.3.5-3.39.1","SUSE CaaS Platform 4.0:terraform-provider-vsphere-1.17.3-3.3.4"]}],"threats":[{"category":"impact","date":"2019-12-10T23:53:24Z","details":"critical"}],"title":"CVE-2019-18801"}]}