Bug 2214473 (CVE-2023-1428)

Summary: CVE-2023-1428 gRPC: Reachable Assertion
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aarif, aazores, abarbaro, adistefa, adudiak, agarcial, alcohan, amctagga, anjoseph, ansmith, aoconnor, aprice, asatyam, asegurap, bbuckingham, bdettelb, bniver, brainfor, caswilli, cdaley, chazlett, ckandaga, cmah, code, danken, dfreiber, dhanak, dholler, diagrawa, dkuc, doconnor, drow, dsimansk, dymurray, eaguilar, ebaron, eglynn, ehelms, fdeutsch, fjansen, flucifre, ggainey, gkamathe, gmeno, gparvin, hkataria, ibolton, jburrell, jcantril, jchui, jforrest, jhe, jjoyce, jkang, jkoehler, jmatthew, jmitchel, jmontleo, jolong, jpallich, jprabhak, jsamir, jschluet, jsherril, jtanner, juwatts, jwendell, kaycoth, kgaikwad, kholdawa, kingland, kshier, ktsao, kverlaen, lbainbri, lchilton, lgamliel, lhh, lphiri, lsharar, lsvaty, luizcosta, matzew, mbenjamin, mbocek, mburns, mgarciac, mhackett, mhulan, mkleinhe, mnovotny, mpierce, mrajanna, muagarwa, mwringe, nboldt, njean, nmoumoul, nweather, odf-bz-bot, oezr, omaciel, orabin, oramraz, owatkins, pahickey, pcreech, peholase, pgaikwad, pgrist, phoracek, pierdipi, pjindal, psegedy, psrna, pvasanth, rbobbitt, rcernich, rchan, rfreiman, rguimara, rhaigner, rhos-maint, rhuss, rjohnson, rochandr, rogbas, rojacob, rtaniwa, sabiswas, sakbas, saroy, sdawley, sfeifer, sfroberg, slucidi, smallamp, smullick, sostapov, sseago, stcannon, sthirugn, stirabos, teagle, thason, tkral, tnielsen, twalsh, vereddy, vkrizan, vkumar, vmugicag, whayutin, wtam, yguenane, zkayyali
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the gRPC library. Affected versions of this package are vulnerable to a reachable assertion, causing the abort function to be called and resulting in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2214474, 2214475, 2214476    
Bug Blocks: 2213811    

Description Avinash Hanwate 2023-06-13 06:09:11 UTC
There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

Comment 1 Avinash Hanwate 2023-06-13 06:10:00 UTC
Created flatbuffers tracking bugs for this issue:

Affects: fedora-all [bug 2214475]


Created grpc tracking bugs for this issue:

Affects: fedora-all [bug 2214474]
Affects: openstack-rdo [bug 2214476]

Comment 4 Ben Beasley 2023-06-16 15:06:52 UTC
Initial analysis in https://bugzilla.redhat.com/show_bug.cgi?id=2214474#c2.

TLDR: It doesn’t look like the fix can be reliably backported to the packaged version; updating to a new enough version in Rawhide will require protobuf to be updated to 4.x (22.x/23.x), which is desirable but will probably impact a lot of packages; and updating to a new enough version in F38/F37/EPEL9 will not be possible due to the protobuf 4.x requirement and because the update would be ABI- and API-incompatible.

I’ve closed the flatbuffers bug because I verified that flatbuffers doesn’t bundle any of the grpc source files that were changed upstream to fix this issue. https://bugzilla.redhat.com/show_bug.cgi?id=2214475#c2

Comment 9 errata-xmlrpc 2024-12-03 16:16:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:10761 https://access.redhat.com/errata/RHSA-2024:10761