Attackers can send specifically crafted HTTP/2 or HTTP/3 requests to trigger parsing errors on HTTP/1 upstream service.
Public: https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp
This issue has been addressed in the following products: Red Hat OpenShift Service Mesh 2.2 for RHEL 8 Via RHSA-2023:4623 https://access.redhat.com/errata/RHSA-2023:4623
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-27491