Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
History

Thu, 19 Dec 2024 14:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 18 Dec 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Dec 2024 19:30:00 +0000

Type Values Removed Values Added
Description Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
Title HTTP/1.1 multiple issues with envoy.reloadable_features.http1_balsa_delay_reset in envoy
Weaknesses CWE-670
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-12-18T21:34:22.425Z

Reserved: 2024-11-19T20:08:14.482Z

Link: CVE-2024-53271

cve-icon Vulnrichment

Updated: 2024-12-18T21:32:43.362Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-18T20:15:24.433

Modified: 2024-12-18T22:15:07.010

Link: CVE-2024-53271

cve-icon Redhat

Severity : Important

Publid Date: 2024-12-18T19:12:20Z

Links: CVE-2024-53271 - Bugzilla