CVE-2021-28683
Summary
| CVE | CVE-2021-28683 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-05-20 17:15:00 UTC |
| Updated | 2021-05-27 15:19:00 UTC |
| Description | An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Releases · envoyproxy/envoy · GitHub |
MISC |
github.com |
|
| Crash when peer sends a TLS Alert with an unknown code · Advisory · envoyproxy/envoy · GitHub |
MISC |
github.com |
Third Party Advisory |
| Envoy Proxy |
MISC |
blog.envoyproxy.io |
|
| Integer overflow in large grpc-timeout values leads to unexpected timeout calculations · Advisory · envoyproxy/envoy · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159333 Oracle Enterprise Linux Security Update for olcne (ELSA-2021-9396)
- 159334 Oracle Enterprise Linux Security Update for olcne (ELSA-2021-9397)
- 159335 Oracle Enterprise Linux Security Update for olcne (ELSA-2021-9398)
- 159336 Oracle Enterprise Linux Security Update for olcne (ELSA-2021-9399)