Source: grpc
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for grpc.

CVE-2024-7246[0]:
| It's possible for a gRPC client communicating with a HTTP/2 proxy to
| poison the HPACK table between the proxy and the backend such that
| other clients see failed requests. It's also possible to use this
| vulnerability to leak other clients HTTP header keys, but not
| values.  This occurs because the error status for a misencoded
| header is not cleared between header reads, resulting in subsequent
| (incrementally indexed) added headers in the first request being
| poisoned until cleared from the HPACK table.  Please update to a
| fixed version of gRPC as soon as possible. This bug has been fixed
| in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

https://github.com/grpc/grpc/issues/36245


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-7246
    https://www.cve.org/CVERecord?id=CVE-2024-7246

Please adjust the affected versions in the BTS as needed.

Reply via email to