First published: Thu Sep 09 2021(Updated: )
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | <=1.16.4 | |
Envoy Proxy | >=1.17.0<1.17.4 | |
Envoy Proxy | >=1.18.0<1.18.4 | |
Envoy Proxy | =1.19.0 | |
Pomerium | <0.14.8 | |
Pomerium | =0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39204 is a vulnerability that affects Pomerium and Envoy, leading to high CPU utilization and a potential DoS condition.
Envoy versions up to 1.16.4, Envoy versions 1.17.0 to 1.17.4, Envoy versions 1.18.0 to 1.18.4, Envoy version 1.19.0, and Pomerium versions up to 0.14.8 and version 0.15.0 are affected by CVE-2021-39204.
CVE-2021-39204 has a severity rating of 7.5 (high).
CVE-2021-39204 can lead to high CPU utilization and a potential DoS (Denial of Service) condition when a large number of HTTP/2 streams are reset.
To mitigate CVE-2021-39204, ensure you have updated to a fixed version of Pomerium or Envoy as recommended by the respective advisory.