Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-12604

Опубликовано: 01 июл. 2020
Источник: debian
EPSS Низкий

Описание

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
envoyproxyitppackage

EPSS

Процентиль: 63%
0.00437
Низкий

Связанные уязвимости

CVSS3: 7.5
redhat
больше 5 лет назад

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

CVSS3: 7.5
nvd
больше 5 лет назад

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

suse-cvrf
почти 4 года назад

Security update for envoy-proxy

EPSS

Процентиль: 63%
0.00437
Низкий