Envoy version 1.14.1 or earlier may exhaust file descriptors and/or memory when accepting too many connections.
Acknowledgments: Name: the Envoy security team
Statement: A uncontrolled resource consumption vulnerability was found in Envoy. An attacker can initiate too many connections to the proxy potentially exhausting file descriptors and/or memory resulting in a denial of service.
External References: https://istio.io/latest/news/security/istio-security-2020-007/
Upstream commit: https://github.com/envoyproxy/envoy/commit/dfddb529e914d794ac552e906b13d71233609bf7
And: https://github.com/envoyproxy/envoy/commit/542f84c66e9f6479bc31c6f53157c60472b25240
This issue has been addressed in the following products: OpenShift Service Mesh 1.1 Via RHSA-2020:2798 https://access.redhat.com/errata/RHSA-2020:2798
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8663
This issue has been addressed in the following products: OpenShift Service Mesh 1.0 Via RHSA-2020:2864 https://access.redhat.com/errata/RHSA-2020:2864