High severityNVD Advisory· Published Sep 9, 2021· Updated Aug 4, 2024
Excessive CPU usage in Pomerium
CVE-2021-39204
Description
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/pomerium/pomeriumGo | < 0.14.8 | 0.14.8 |
github.com/pomerium/pomeriumGo | >= 0.15.0, < 0.15.1 | 0.15.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-5wjf-62hw-q78rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-39204ghsaADVISORY
- github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chccghsax_refsource_MISCWEB
- github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78rghsax_refsource_CONFIRMWEB
- groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.