Disable HTTP/2 for webhook #7235
Labels
kind/security
Categorizes issue or PR as related to a security issue
priority/critical-urgent
Highest priority. Must be actively worked on as someone's top priority right now.
We need to disable HTTP/2 for webhooks.
"
The go runtime does have a fix to mitigate the CVE-2023-44487 to a degree, but as kubernetes/kubernetes#121197 shows, a single connection attempting to perform a denial-of-service attack against a go-based HTTP/2 server resulted in the server process quickly consuming 5 GB of memory. Additional connections would likely result in an OOM situation very quickly.
"
Please check this: kubernetes/kubernetes#121197
/kind security
The text was updated successfully, but these errors were encountered: