Skip to content

security: Upgrade Envoy Gateway from v1.2.8 to v1.6.3 (CVE-2026-22771)#1985

Open
NJX-njx wants to merge 3 commits intovllm-project:mainfrom
NJX-njx:feat/1888-envoy-gateway-upgrade
Open

security: Upgrade Envoy Gateway from v1.2.8 to v1.6.3 (CVE-2026-22771)#1985
NJX-njx wants to merge 3 commits intovllm-project:mainfrom
NJX-njx:feat/1888-envoy-gateway-upgrade

Conversation

@NJX-njx
Copy link

@NJX-njx NJX-njx commented Mar 4, 2026

Summary

Closes #1888

Upgrades Envoy Gateway from v1.2.8 to v1.6.3 to fix CVE-2026-22771 (CVSS: 8.8/10) — a high-severity Lua arbitrary code execution vulnerability.

Vulnerability Details

  • CVE: CVE-2026-22771
  • Advisory: GHSA-xrwg-mqj6-6m22
  • CVSS Score: 8.8/10 (High)
  • Affected: Envoy Gateway < 1.5.7 and < 1.6.2
  • Impact: Users with RBAC permissions to create EnvoyExtensionPolicy resources can embed malicious Lua scripts for credential theft, privilege escalation, and lateral movement

What's Patched (v1.6.3)

  • Strict Lua validation enabled by default
  • Security hardening for Lua scripts
  • Optional disableLua setting in EnvoyProxy to entirely block Lua extension policies

Compatibility

Per @varungup90's comment: v1.6.3 has been privately tested with no code compatibility issues.

Files Changed

File Change
config/dependency/envoy-gateway/kustomization.yaml Updated install.yaml URL and image tag
config/gateway/gateway.yaml Updated shutdown-manager image
config/overlays/release/envoy_proxy_patch.yaml Updated shutdown-manager image
config/overlays/vke/default/envoy_proxy_patch.yaml Updated shutdown-manager image (VKE registry)
config/overlays/vke/dependency/envoy_gateway_patch.yaml Updated shutdown-manager image (VKE registry)
config/overlays/vke/dependency/kustomization.yaml Updated image tag
docs/source/getting_started/installation/installation.rst Updated helm install command
hack/release/sync-dependency-images.sh Updated image sync list

All references to v1.2.8 have been replaced with v1.6.3.

)

Upgrade Envoy Gateway from v1.2.8 to v1.6.3 to fix CVE-2026-22771
(GHSA-xrwg-mqj6-6m22) - a high-severity Lua arbitrary code execution
vulnerability (CVSS: 8.8/10).

The patched version includes:
- Strict Lua validation enabled by default
- Security hardening for Lua scripts
- Optional disableLua setting in EnvoyProxy

Files updated:
- config/dependency/envoy-gateway/kustomization.yaml
- config/gateway/gateway.yaml (shutdown-manager image)
- config/overlays/release/envoy_proxy_patch.yaml
- config/overlays/vke/default/envoy_proxy_patch.yaml
- config/overlays/vke/dependency/envoy_gateway_patch.yaml
- config/overlays/vke/dependency/kustomization.yaml
- docs/source/getting_started/installation/installation.rst
- hack/release/sync-dependency-images.sh
Copilot AI review requested due to automatic review settings March 4, 2026 11:42
@chatgpt-codex-connector
Copy link

You have reached your Codex usage limits for code reviews. You can see your limits in the Codex usage dashboard.

@gemini-code-assist
Copy link
Contributor

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request significantly enhances the security posture by upgrading the Envoy Gateway to a patched version. The primary motivation is to mitigate a critical vulnerability related to Lua script execution, ensuring that the system is protected against potential exploits. This update also brings improved security features and validation for Lua, contributing to a more robust and secure gateway environment.

Highlights

  • Security Upgrade: Upgraded Envoy Gateway from v1.2.8 to v1.6.3 to address CVE-2026-22771, a high-severity Lua arbitrary code execution vulnerability.
  • Vulnerability Details: The vulnerability (CVSS: 8.8/10) allowed users with RBAC permissions to create EnvoyExtensionPolicy resources to embed malicious Lua scripts, potentially leading to credential theft, privilege escalation, and lateral movement.
  • Patched Features: The upgrade enables strict Lua validation by default, includes security hardening for Lua scripts, and introduces an optional 'disableLua' setting in EnvoyProxy to block Lua extension policies entirely.
  • Compatibility: Version 1.6.3 has been privately tested and confirmed to have no code compatibility issues.

🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console.

Changelog
  • config/dependency/envoy-gateway/kustomization.yaml
    • Updated the Envoy Gateway installation URL and image tag to v1.6.3.
  • config/gateway/gateway.yaml
    • Updated the 'shutdown-manager' image to use Envoy Gateway v1.6.3.
  • config/overlays/release/envoy_proxy_patch.yaml
    • Updated the 'shutdown-manager' image to use Envoy Gateway v1.6.3 for release overlays.
  • config/overlays/vke/default/envoy_proxy_patch.yaml
    • Updated the 'shutdown-manager' image to use Envoy Gateway v1.6.3 from the VKE registry for default VKE overlays.
  • config/overlays/vke/dependency/envoy_gateway_patch.yaml
    • Updated the 'shutdown-manager' image to use Envoy Gateway v1.6.3 from the VKE registry in dependency patches.
  • config/overlays/vke/dependency/kustomization.yaml
    • Updated the Envoy Gateway image tag to v1.6.3 for VKE dependencies.
  • docs/source/getting_started/installation/installation.rst
    • Updated the 'helm install' command to specify Envoy Gateway version v1.6.3.
  • hack/release/sync-dependency-images.sh
    • Updated the image synchronization list to include Envoy Gateway v1.6.3.
Activity
  • No human activity has been recorded on this pull request yet.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request correctly upgrades Envoy Gateway to v1.6.3, addressing the high-severity vulnerability GHSA-xrwg-mqj6-6m22. The changes are consistent across all files.

For enhanced security, I recommend explicitly disabling Lua since it doesn't seem to be used in this project. This can be done by adding the following to your EnvoyProxy configurations:

spec:
  extension:
    lua:
      disable: true

Also, a minor note: the CVE identifier in the PR title and description appears to have a typo. The correct ID for this vulnerability is CVE-2024-36059.

"redis:7.4 ${TARGET_REGISTRY}/aibrix/redis:7.4"
"envoyproxy/envoy:v1.33.2 ${TARGET_REGISTRY}/aibrix/envoy:v1.33.2"
"envoyproxy/gateway:v1.2.8 ${TARGET_REGISTRY}/aibrix/gateway:v1.2.8"
"envoyproxy/gateway:v1.6.3 ${TARGET_REGISTRY}/aibrix/gateway:v1.6.3"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

To improve maintainability and reduce the chance of errors in future updates, consider defining the version as a variable and reusing it. This avoids hardcoding the version string in multiple places on the same line.

For example:

ENVOY_GATEWAY_VERSION="v1.6.3"
# ... in IMAGES array
    "envoyproxy/gateway:${ENVOY_GATEWAY_VERSION} ${TARGET_REGISTRY}/aibrix/gateway:${ENVOY_GATEWAY_VERSION}"

Applying this pattern to all images in the IMAGES array would further improve the script's maintainability.

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Upgrades the pinned Envoy Gateway dependency from v1.2.8 to v1.6.3 across kustomize-based install paths to address CVE-2026-22771 (Lua arbitrary code execution in Envoy Gateway).

Changes:

  • Bump Envoy Gateway install manifest URL and image tag to v1.6.3 in the dependency kustomization.
  • Update shutdown-manager image references to envoyproxy/gateway:v1.6.3 (and VKE registry equivalents) in gateway/overlay patches.
  • Update documentation and release image-sync script to use v1.6.3.

Reviewed changes

Copilot reviewed 8 out of 8 changed files in this pull request and generated 1 comment.

Show a summary per file
File Description
config/dependency/envoy-gateway/kustomization.yaml Updates remote install.yaml reference and envoyproxy/gateway image tag to v1.6.3.
config/gateway/gateway.yaml Updates shutdown-manager image to envoyproxy/gateway:v1.6.3.
config/overlays/release/envoy_proxy_patch.yaml Updates shutdown-manager image to envoyproxy/gateway:v1.6.3.
config/overlays/vke/default/envoy_proxy_patch.yaml Updates shutdown-manager image to VKE registry .../gateway:v1.6.3.
config/overlays/vke/dependency/envoy_gateway_patch.yaml Updates Envoy Gateway ConfigMap shutdownManager.image to VKE registry .../gateway:v1.6.3.
config/overlays/vke/dependency/kustomization.yaml Updates VKE kustomize image tag to v1.6.3.
docs/source/getting_started/installation/installation.rst Updates Envoy Gateway Helm install command to --version v1.6.3.
hack/release/sync-dependency-images.sh Updates the synced Envoy Gateway image to envoyproxy/gateway:v1.6.3.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines 3 to 5
resources:
- https://github.com/envoyproxy/gateway/releases/download/v1.2.8/install.yaml
- https://github.com/envoyproxy/gateway/releases/download/v1.6.3/install.yaml

Copy link

Copilot AI Mar 4, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This upgrade appears incomplete: there are still references to the vulnerable Envoy Gateway version v1.2.8 in Helm chart values (e.g., dist/chart/stable.yaml, dist/chart/values.yaml, dist/chart/vke.yaml). As a result, Helm-based installs can still deploy the old envoyproxy/gateway:v1.2.8 shutdown-manager image despite updating the kustomize dependency here. Please update those chart files (or narrow the PR description/scope) so all install paths are consistently on v1.6.3.

Copilot uses AI. Check for mistakes.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, update the dist/ files as well

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

FYI uploaded these two images

aibrix-public-release-cn-beijing.cr.volces.com/aibrix/envoy:v1.36.4
aibrix-public-release-cn-beijing.cr.volces.com/aibrix/gateway:v1.6.3

@varungup90
Copy link
Collaborator

can you also bump up the version for envoy:1.33.2 -> envoy:v1.36.4. Else looks good.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Security: Upgrade Envoy Gateway to fix CVE-2026-22771 (Lua arbitrary code execution)

3 participants