Envoy through 1.14.1 may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (e.g., 1 byte) data frames.
Acknowledgments: Name: the Envoy security team
Statement: A uncontrolled resource consumption vulnerability was found in Envoy. An attacker could craft many HTTP/2 requests (or responses) with very small data frames, to cause the proxy to consume excessive amounts of memory potentially resulting in a denial of service.
External References: https://istio.io/latest/news/security/istio-security-2020-007/
Upstream commit: https://github.com/envoyproxy/envoy/commit/0e49a495826ea9e29134c1bd54fdeb31a034f40c
This issue has been addressed in the following products: OpenShift Service Mesh 1.1 Via RHSA-2020:2798 https://access.redhat.com/errata/RHSA-2020:2798
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-12603
This issue has been addressed in the following products: OpenShift Service Mesh 1.0 Via RHSA-2020:2864 https://access.redhat.com/errata/RHSA-2020:2864