NULL Pointer Dereference Affecting github.com/envoyproxy/envoy/contrib/golang/upstreams/http/tcp/source/go/pkg/upstreams/http/tcp package, versions <1.33.11>=1.34.0 <1.34.9>=1.35.0 <1.35.5>=1.36.0 <1.36.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMENVOYPROXYENVOYCONTRIBGOLANGUPSTREAMSHTTPTCPSOURCEGOPKGUPSTREAMSHTTPTCP-13638673
  • published20 Oct 2025
  • disclosed16 Oct 2025
  • creditbotengyao, Kuo-Chung Hsu

Introduced: 16 Oct 2025

NewCVE-2025-62409  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade github.com/envoyproxy/envoy/contrib/golang/upstreams/http/tcp/source/go/pkg/upstreams/http/tcp to version 1.33.11, 1.34.9, 1.35.5, 1.36.1 or higher.

Overview

Affected versions of this package are vulnerable to NULL Pointer Dereference in the flow control management process while overriding onAboveWriteBufferHighWatermark and onBelowWriteBufferLowWatermark callbacks. An attacker can cause a crash of the TCP connection pool by sending large requests or responses when the connection is closing but upstream data is still being received, resulting in a null pointer dereference in the buffer watermark callback. This can impact both TCP proxy and mixed HTTP/1 and HTTP/2 use cases based on ALPN.

References

CVSS Base Scores

version 4.0
version 3.1