{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2024-53271","title":"Title"},{"category":"description","text":"Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy  does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2024-53271","url":"https://www.suse.com/security/cve/CVE-2024-53271"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1234747 for CVE-2024-53271","url":"https://bugzilla.suse.com/1234747"}],"title":"SUSE CVE CVE-2024-53271","tracking":{"current_release_date":"2025-02-16T03:56:25Z","generator":{"date":"2024-12-21T00:19:27Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2024-53271","initial_release_date":"2024-12-21T00:19:27Z","revision_history":[{"date":"2024-12-21T00:19:27Z","number":"2","summary":"Current version"},{"date":"2025-02-14T04:04:04Z","number":"3","summary":"Current version"},{"date":"2025-02-16T03:56:25Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}