CVE-2024-53271

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

No configuration.

History

18 Dec 2024, 22:15

Type Values Removed Values Added
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f - () https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f -

18 Dec 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-18 20:15

Updated : 2024-12-18 22:15


NVD link : CVE-2024-53271

Mitre link : CVE-2024-53271

CVE.ORG link : CVE-2024-53271


JSON object : View

Products Affected

No product.

CWE
CWE-670

Always-Incorrect Control Flow Implementation