Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.
References
Link | Resource |
---|---|
https://github.com/envoyproxy/envoy/commits/master | Patch Third Party Advisory |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-8hf8-8gvw-ggvx | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-07-01T14:24:49
Updated: 2020-07-01T14:24:49
Reserved: 2020-05-01T00:00:00
Link: CVE-2020-12604
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-07-01T15:15:12.923
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-12604
JSON object: View
Redhat Information
No data.
CWE