CVE-2020-8659
Summary
| CVE | CVE-2020-8659 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-03-04 21:15:00 UTC |
| Updated | 2022-09-30 22:56:00 UTC |
| Description | CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Excessive CPU and/or memory usage when proxying HTTP/1.1 · Advisory · envoyproxy/envoy · GitHub |
MISC |
github.com |
Third Party Advisory |
| Version history — envoy tag-v1.13.1 documentation |
CONFIRM |
www.envoyproxy.io |
Release Notes, Third Party Advisory |
| [SECURITY] [DLA 3014-1] elog security update |
MLIST |
lists.debian.org |
|
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179296 Debian Security Update for elog (DLA 3014-1)