A vulnerability was found in Envoy version 1.13.0 or earlier may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
Acknowledgments: Name: The Envoy Security Team
This issue has been addressed in the following products: OpenShift Service Mesh 1.0 Via RHSA-2020:0734 https://access.redhat.com/errata/RHSA-2020:0734
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8659
External References: https://github.com/envoyproxy/envoy/security/advisories/GHSA-jwcm-4pwp-c2qv