First published: Tue Jun 13 2023(Updated: )
There exists an vulnerability causing an abort() to be called in gRPC. The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.
Affected Software | Affected Version | How to fix |
---|---|---|
gRPC | <v1.53>undefined |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2214473 is considered critical due to the potential for application crashes.
To fix REDHAT-BUG-2214473, update to a version of gRPC C++ that is later than v1.53.
REDHAT-BUG-2214473 specifically affects the gRPC C++ implementation.
The vulnerability REDHAT-BUG-2214473 is triggered when specific HTTP2 headers are sent to gRPC.
Yes, while REDHAT-BUG-2214473 induces application crashes, it can be exploited in a broader context to affect service reliability.