Vulnerability Description
CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cncf | Envoy | <= 1.13.0 |
| Redhat | Openshift Service Mesh | 1.0 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2020:0734Third Party Advisory
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-jwcm-4pwp-c2qvThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/05/msg00025.htmlMailing ListThird Party Advisory
- https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_historyRelease NotesThird Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0734Third Party Advisory
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-jwcm-4pwp-c2qvThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/05/msg00025.htmlMailing ListThird Party Advisory
- https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_historyRelease NotesThird Party Advisory
FAQ
What is CVE-2020-8659?
CVE-2020-8659 is a vulnerability with a CVSS score of 7.5 (HIGH). CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
How severe is CVE-2020-8659?
CVE-2020-8659 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8659?
Check the references section above for vendor advisories and patch information. Affected products include: Cncf Envoy, Redhat Openshift Service Mesh, Debian Debian Linux.