7.5
CWE
670 476
Advisory Published
Updated

CVE-2024-53270: HTTP/1: sending overload crashes when the request is reset beforehand in envoy

First published: Wed Dec 18 2024(Updated: )

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullptr, only onMessageBeginImpl() is called. However, the `onMessageBeginImpl` will directly return ok status if the stream is already reset leading to the nullptr reference. The downstream reset can actually happen during the H/2 upstream reset. As a result envoy may crash. This issue has been addressed in releases 1.32.3, 1.31.5, 1.30.9, and 1.29.12. Users are advised to upgrade. Users unable to upgrade may disable `http1_server_abort_dispatch` load shed point and/or use a high threshold.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Envoy Proxy>1.29.12<=1.32.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-53270?

    CVE-2024-53270 is classified as a high-severity vulnerability due to its potential impact on service availability.

  • How does CVE-2024-53270 affect Envoy Proxy?

    CVE-2024-53270 affects Envoy Proxy by causing an assumption that an active request exists when certain load shedding configurations are applied, which can lead to unexpected behavior.

  • Which versions of Envoy Proxy are affected by CVE-2024-53270?

    CVE-2024-53270 affects Envoy Proxy versions between 1.29.12 and 1.32.3 (exclusive).

  • How do I fix CVE-2024-53270?

    To fix CVE-2024-53270, upgrade Envoy Proxy to a version that is not within the affected range, specifically a version later than 1.32.3.

  • Is there a workaround for CVE-2024-53270?

    Currently, there are no documented workarounds for CVE-2024-53270, and the best course of action is to update to a secure version.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203