The following issues are fixed in 1.15.5-gke.41: The vulnerability, CVE-2023-44487, allows an attacker to execute a denial-of-service attack on Apigee ingresses. What Vulnerabilities Are Addressed By These Patches? Customers do not need to take any actions. This includes deployments that have HTTP/2 enabled for gRPC proxies.Īll Apigee X instances will be automatically updated within the next few days. Your Apigee X instances will be automatically updated within the next few days.Īpigee X instances which are accessed only via Google Cloud Application Load Balancers (Layer 7) are not affected. A hotfix is being applied to all Apigee X instances. The vulnerability could lead to a DoS of Apigee API management functionality.ĭeployments of Apigee X that are accessible through a Google Cloud Network Load Balancer (Layer 4), or a custom layer 4 load balancer, are affected. Save money with our transparent approach to pricingĪ Denial-of-Service (DoS) vulnerability was recently discovered in multiple implementations of the HTTP/2 protocol ( CVE-2023-44487), including the Apigee Ingress (Anthos Service Mesh) server used by Apigee X. Migrate from PaaS: Cloud Foundry, OpenshiftĬOVID-19 Solutions for the Healthcare Industry
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |