CVE-2021-39204
09.09.2021, 22:15
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.Enginsight
Vendor | Product | Version |
---|---|---|
envoyproxy | envoy | 𝑥 ≤ 1.16.4 |
envoyproxy | envoy | 1.17.0 ≤ 𝑥 < 1.17.4 |
envoyproxy | envoy | 1.18.0 ≤ 𝑥 < 1.18.4 |
envoyproxy | envoy | 1.19.0 |
pomerium | pomerium | 𝑥 < 0.14.8 |
pomerium | pomerium | 0.15.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References