Описание
Excessive CPU usage
Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset.
Impact
This can result in a DoS condition.
Patches
Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
Workarounds
N/A
References
envoy GSA envoy CVE envoy announcement
For more information
If you have any questions or comments about this advisory:
- Open an issue in pomerium/pomerium
- Email us at security@pomerium.com
Пакеты
github.com/pomerium/pomerium
< 0.14.8
0.14.8
github.com/pomerium/pomerium
= 0.15.0
0.15.1
Связанные уязвимости
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.