Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset.
This can result in a DoS condition.
Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
N/A
envoy GSA envoy CVE envoy announcement
If you have any questions or comments about this advisory: * Open an issue in pomerium/pomerium * Email us at security@pomerium.com
{ "nvd_published_at": "2021-09-09T22:15:00Z", "severity": "HIGH", "github_reviewed_at": "2021-09-10T16:33:46Z", "github_reviewed": true, "cwe_ids": [ "CWE-834" ] }