Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes.
Public: https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2
This issue has been addressed in the following products: Red Hat OpenShift Service Mesh 2.2 for RHEL 8 Via RHSA-2023:4623 https://access.redhat.com/errata/RHSA-2023:4623
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-27492