Excessive CPU usage
Package
Affected versions
< 0.14.8
= 0.15.0
Patched versions
0.14.8
0.15.1
Description
Published by the National Vulnerability Database
Sep 9, 2021
Reviewed
Sep 10, 2021
Published to the GitHub Advisory Database
Sep 10, 2021
Last updated
Feb 1, 2023
Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset.
Impact
This can result in a DoS condition.
Patches
Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
Workarounds
N/A
References
envoy GSA
envoy CVE
envoy announcement
For more information
If you have any questions or comments about this advisory:
References