Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event.
This can lead to a DoS in the presence of untrusted upstream servers.
0.15.1 contains an upgraded envoy binary with this vulnerability patched.
If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.
envoy GSA envoy CVE envoy announcement
If you have any questions or comments about this advisory: * Open an issue in pomerium/pomerium * Email us at security@pomerium.com
{ "nvd_published_at": "2021-09-09T22:15:00Z", "github_reviewed_at": "2021-09-10T16:32:16Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-754" ] }