Envoy proxy 1.19.1 contains a vulnerability in the following components: - decompressor - json-transcoder - grpc-webextension - proprietary extensions Which allows for an increase in the request size and causes Envoy to reference de-allocated memory resulting in a denial of service.
This issue has been addressed in the following products: OpenShift Service Mesh 1.1 Via RHSA-2021:3273 https://access.redhat.com/errata/RHSA-2021:3273
This issue has been addressed in the following products: OpenShift Service Mesh 2.0 Via RHSA-2021:3272 https://access.redhat.com/errata/RHSA-2021:3272
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-32781