Bug 2214463 (CVE-2023-32731) - CVE-2023-32731 gRPC: sensitive information disclosure
Summary: CVE-2023-32731 gRPC: sensitive information disclosure
Keywords:
Status: NEW
Alias: CVE-2023-32731
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2214465 2214466 2214467
Blocks: 2213811
TreeView+ depends on / blocked
 
Reported: 2023-06-13 05:57 UTC by Avinash Hanwate
Modified: 2025-04-11 08:09 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:10761 0 None None None 2024-12-03 16:16:47 UTC

Description Avinash Hanwate 2023-06-13 05:57:43 UTC
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in  https://github.com/grpc/grpc/pull/32309 https://github.com/grpc/grpc/pull/32309

Comment 1 Avinash Hanwate 2023-06-13 06:00:07 UTC
Created flatbuffers tracking bugs for this issue:

Affects: fedora-all [bug 2214465]


Created grpc tracking bugs for this issue:

Affects: fedora-all [bug 2214466]
Affects: openstack-rdo [bug 2214467]

Comment 5 errata-xmlrpc 2024-12-03 16:16:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:10761 https://access.redhat.com/errata/RHSA-2024:10761


Note You need to log in before you can comment on or make changes to this bug.