Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-1428

Опубликовано: 09 июн. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

A flaw was found in the gRPC library. Affected versions of this package are vulnerable to a reachable assertion, causing the abort function to be called and resulting in a denial of service.

Отчет

This vulnerability is specific to the C++, Python and Ruby implementations of gRPC prior to the 1.53 release. The gRPC library was packaged with Openshift via the Kuryr component. However, Kuryr was never configured to run code using the gRPC library and has since been removed.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-rhel8-operatorNot affected
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-waiters-rhel8Not affected
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-waiters-rhel9Not affected
Builds for Red Hat OpenShiftopenshift-builds-triggers-containerNot affected
cert-manager Operator for Red Hat OpenShiftcert-manager/cert-manager-operator-rhel9Not affected
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-rhel9Not affected
Cryostat 3cryostat-tech-preview/cryostat-ose-oauth-proxy-rhel8Not affected
Cryostat 3cryostat-tech-preview/cryostat-storage-rhel8Not affected
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler/custom-metrics-autoscaler-rhel8Not affected
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operatorNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-617

EPSS

Процентиль: 22%
0.00073
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

There exists an vulnerability causing an abort() to be called in gRPC. The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

CVSS3: 7.5
nvd
больше 2 лет назад

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

CVSS3: 7.5
debian
больше 2 лет назад

There exists an vulnerability causing an abort() to be called in gRPC. ...

CVSS3: 7.5
github
больше 2 лет назад

gRPC Reachable Assertion issue

CVSS3: 7.5
fstec
больше 2 лет назад

Уязвимость системы удалённого вызова процедур Google gRPC, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 22%
0.00073
Низкий

7.5 High

CVSS3