Описание
Security update for grpc
This update for grpc fixes the following issues:
- CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919)
- CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821)
Список пакетов
SUSE Linux Enterprise Module for Basesystem 15 SP5
SUSE Linux Enterprise Module for Public Cloud 15 SP5
openSUSE Leap 15.5
Ссылки
- Link for SUSE-SU-2024:4436-1
- E-Mail link for SUSE-SU-2024:4436-1
- SUSE Security Ratings
- SUSE Bug 1228919
- SUSE Bug 1233821
- SUSE CVE CVE-2024-11407 page
- SUSE CVE CVE-2024-7246 page
Описание
There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experience data corruption issues. The data sent by the application may be corrupted before transmission over the network thus leading the receiver to receive an incorrect set of bytes causing RPC requests to fail. We recommend upgrading past commit e9046b2bbebc0cb7f5dc42008f807f6c7e98e791
Затронутые продукты
Ссылки
- CVE-2024-11407
- SUSE Bug 1233821
Описание
It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.
Затронутые продукты
Ссылки
- CVE-2024-7246
- SUSE Bug 1228919