Bug 2214463 (CVE-2023-32731) - CVE-2023-32731 gRPC: sensitive information disclosure
Summary: CVE-2023-32731 gRPC: sensitive information disclosure
Keywords:
Status: NEW
Alias: CVE-2023-32731
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2214467 2214465 2214466
Blocks: 2213811
TreeView+ depends on / blocked
 
Reported: 2023-06-13 05:57 UTC by Avinash Hanwate
Modified: 2023-07-07 08:28 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: ---
Doc Text:
A flaw was found in gRPC. This flaw allows a remote attacker to obtain sensitive information, caused by a flaw when the gRPC HTTP2 stack raised a header size exceeded error. By sending a specially crafted request, an attacker can obtain sensitive information, and use this information to launch further attacks against the affected system.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-06-13 05:57:43 UTC
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in  https://github.com/grpc/grpc/pull/32309 https://github.com/grpc/grpc/pull/32309

Comment 1 Avinash Hanwate 2023-06-13 06:00:07 UTC
Created flatbuffers tracking bugs for this issue:

Affects: fedora-all [bug 2214465]


Created grpc tracking bugs for this issue:

Affects: fedora-all [bug 2214466]
Affects: openstack-rdo [bug 2214467]


Note You need to log in before you can comment on or make changes to this bug.