Debian Grpc vulnerabilities
12 known vulnerabilities affecting debian/grpc.
Total CVEs
12
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL4HIGH3MEDIUM3LOW2
Vulnerabilities
Page 1 of 1
CVE-2024-11407MEDIUMCVSS 6.92024
CVE-2024-11407 [MEDIUM] CVE-2024-11407: grpc - There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ ...
There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experience data corruption issues. The data sent by the application may be corrupted before transmission over the network thus leading the receiver to receive an incorrect set of bytes cau
debian
CVE-2024-7246MEDIUMCVSS 6.32024
CVE-2024-7246 [MEDIUM] CVE-2024-7246: grpc - It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the ...
It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, r
debian
CVE-2023-44487HIGHCVSS 7.5KEVPoCfixed in dnsdist 1.8.2-2 (forky)2023
CVE-2023-44487 [HIGH] CVE-2023-44487: dnsdist - The HTTP/2 protocol allows a denial of service (server resource consumption) bec...
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 1.8.2-2)
sid: resolved (fixed in 1.8.2-2)
trixie: resolved (fixed in 1.8.2-2)
debian
CVE-2023-33953HIGHCVSS 7.52023
CVE-2023-33953 [HIGH] CVE-2023-33953: grpc - gRPC contains a vulnerability that allows hpack table accounting errors could le...
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that o
debian
CVE-2023-4785HIGHCVSS 7.52023
CVE-2023-4785 [HIGH] CVE-2023-4785: grpc - Lack of error handling in the TCP server in Google's gRPC starting version 1.23 ...
Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
Scope: local
bookworm: open
bullseye: open
for
debian
CVE-2023-32732MEDIUMCVSS 5.32023
CVE-2023-32732 [MEDIUM] CVE-2023-32732: grpc - gRPC contains a vulnerability whereby a client can cause a termination of connec...
gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.g
debian
CVE-2023-32731LOWCVSS 7.42023
CVE-2023-32731 [HIGH] CVE-2023-32731: grpc - When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing th...
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing hea
debian
CVE-2023-1428LOWCVSS 7.52023
CVE-2023-1428 [HIGH] CVE-2023-1428: grpc - There exists an vulnerability causing an abort() to be called in gRPC. The foll...
There exists an vulnerability causing an abort() to be called in gRPC. The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend
debian
CVE-2017-7860CRITICALCVSS 9.8fixed in grpc 1.2.5-1+nmu0 (bookworm)2017
CVE-2017-7860 [CRITICAL] CVE-2017-7860: grpc - Google gRPC before 2017-02-22 has an out-of-bounds write caused by a heap-based ...
Google gRPC before 2017-02-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the parse_unix function in core/ext/client_channel/parse_address.c.
Scope: local
bookworm: resolved (fixed in 1.2.5-1+nmu0)
bullseye: resolved (fixed in 1.2.5-1+nmu0)
forky: resolved (fixed in 1.2.5-1+nmu0)
sid: resolved (fixed in 1.2.5-1+nmu0)
trixie: resolved
debian
CVE-2017-7861CRITICALCVSS 9.8fixed in grpc 1.2.5-1+nmu0 (bookworm)2017
CVE-2017-7861 [CRITICAL] CVE-2017-7861: grpc - Google gRPC before 2017-02-22 has an out-of-bounds write related to the gpr_free...
Google gRPC before 2017-02-22 has an out-of-bounds write related to the gpr_free function in core/lib/support/alloc.c.
Scope: local
bookworm: resolved (fixed in 1.2.5-1+nmu0)
bullseye: resolved (fixed in 1.2.5-1+nmu0)
forky: resolved (fixed in 1.2.5-1+nmu0)
sid: resolved (fixed in 1.2.5-1+nmu0)
trixie: resolved (fixed in 1.2.5-1+nmu0)
debian
CVE-2017-9431CRITICALCVSS 9.8fixed in grpc 1.3.2-0.1 (bookworm)2017
CVE-2017-9431 [CRITICAL] CVE-2017-9431: grpc - Google gRPC before 2017-04-05 has an out-of-bounds write caused by a heap-based ...
Google gRPC before 2017-04-05 has an out-of-bounds write caused by a heap-based buffer overflow related to core/lib/iomgr/error.c.
Scope: local
bookworm: resolved (fixed in 1.3.2-0.1)
bullseye: resolved (fixed in 1.3.2-0.1)
forky: resolved (fixed in 1.3.2-0.1)
sid: resolved (fixed in 1.3.2-0.1)
trixie: resolved (fixed in 1.3.2-0.1)
debian
CVE-2017-8359CRITICALCVSS 9.8fixed in grpc 1.3.2-0.1 (bookworm)2017
CVE-2017-8359 [CRITICAL] CVE-2017-8359: grpc - Google gRPC before 2017-03-29 has an out-of-bounds write caused by a heap-based ...
Google gRPC before 2017-03-29 has an out-of-bounds write caused by a heap-based use-after-free related to the grpc_call_destroy function in core/lib/surface/call.c.
Scope: local
bookworm: resolved (fixed in 1.3.2-0.1)
bullseye: resolved (fixed in 1.3.2-0.1)
forky: resolved (fixed in 1.3.2-0.1)
sid: resolved (fixed in 1.3.2-0.1)
trixie: resolved (fixed in 1.3.2-0.1)
debian