First published: Wed Sep 04 2024(Updated: )
In Eclipse Vert.x version 4.3.0 to 4.5.9, the gRPC server does not limit the maximum length of message payload (Maven GAV: io.vertx:vertx-grpc-server and io.vertx:vertx-grpc-client). This is fixed in the 4.5.10 version. Note this does not affect the Vert.x gRPC server based grpc-java and Netty libraries (Maven GAV: io.vertx:vertx-grpc)
Credit: emo@eclipse.org emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.vertx:vertx-grpc-client | >=4.3.0<4.5.10 | 4.5.10 |
maven/io.vertx:vertx-grpc-server | >=4.3.0<4.5.10 | 4.5.10 |
Eclipse Vert.x | >=4.3.0<4.5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8391 has a medium severity level due to the potential for denial of service through excessive message payloads.
To fix CVE-2024-8391, upgrade to version 4.5.10 of io.vertx:vertx-grpc-server or io.vertx:vertx-grpc-client.
CVE-2024-8391 affects Eclipse Vert.x versions from 4.3.0 up to 4.5.9 inclusive.
CVE-2024-8391 is related to the gRPC server's lack of limits on the maximum length of message payloads.
CVE-2024-8391 is specific to the gRPC server and client components but does not affect other parts of Eclipse Vert.x.