Hide Forgot
A null reference vulnerability was found in all versions of Envoy up to 1.17.2. If an attacker can craft a HTTP2 request that specifies an empty metadata map[1], then envoy will attempt to process this and crash, resulting in a denial of service. [1] - https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md
Acknowledgments: Name: the Envoy security team
External References: https://istio.io/latest/news/security/istio-security-2021-003/ https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md
This issue has been addressed in the following products: OpenShift Service Mesh 2.0 Via RHSA-2021:1324 https://access.redhat.com/errata/RHSA-2021:1324
This issue has been addressed in the following products: OpenShift Service Mesh 1.1 Via RHSA-2021:1322 https://access.redhat.com/errata/RHSA-2021:1322
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-29258