-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update module google.golang.org/grpc to v1.58.3 [SECURITY] #49
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Oct 27, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
October 27, 2023 10:20
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Oct 27, 2023
renovate
bot
restored the
renovate/go-google.golang.org/grpc-vulnerability
branch
October 27, 2023 18:40
renovate
bot
force-pushed
the
renovate/go-google.golang.org/grpc-vulnerability
branch
from
October 27, 2023 18:40
15bf094
to
a337e5d
Compare
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Oct 27, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
October 27, 2023 22:34
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Oct 28, 2023
renovate
bot
restored the
renovate/go-google.golang.org/grpc-vulnerability
branch
October 28, 2023 10:43
renovate
bot
force-pushed
the
renovate/go-google.golang.org/grpc-vulnerability
branch
from
October 28, 2023 10:44
a337e5d
to
4414aaa
Compare
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Oct 28, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
October 28, 2023 13:58
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Oct 29, 2023
renovate
bot
restored the
renovate/go-google.golang.org/grpc-vulnerability
branch
October 29, 2023 07:09
renovate
bot
force-pushed
the
renovate/go-google.golang.org/grpc-vulnerability
branch
from
October 29, 2023 07:09
4414aaa
to
146378b
Compare
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Oct 29, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
October 29, 2023 13:50
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Oct 29, 2023
renovate
bot
restored the
renovate/go-google.golang.org/grpc-vulnerability
branch
October 29, 2023 21:07
renovate
bot
force-pushed
the
renovate/go-google.golang.org/grpc-vulnerability
branch
from
October 29, 2023 21:08
146378b
to
624b234
Compare
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Oct 30, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 12, 2023 10:51
renovate
bot
restored the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 12, 2023 15:15
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Nov 12, 2023
renovate
bot
force-pushed
the
renovate/go-google.golang.org/grpc-vulnerability
branch
from
November 12, 2023 15:16
9c841d2
to
3cfb7a6
Compare
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Nov 12, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 12, 2023 20:04
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Nov 12, 2023
renovate
bot
restored the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 12, 2023 21:37
renovate
bot
force-pushed
the
renovate/go-google.golang.org/grpc-vulnerability
branch
from
November 12, 2023 21:38
3cfb7a6
to
463bd34
Compare
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Nov 13, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 13, 2023 01:49
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Nov 13, 2023
renovate
bot
restored the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 13, 2023 09:04
renovate
bot
force-pushed
the
renovate/go-google.golang.org/grpc-vulnerability
branch
from
November 13, 2023 09:05
463bd34
to
18927d0
Compare
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Nov 13, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 13, 2023 14:41
renovate
bot
changed the title
Update module google.golang.org/grpc to v1.58.3 [SECURITY] - autoclosed
Update module google.golang.org/grpc to v1.58.3 [SECURITY]
Nov 13, 2023
renovate
bot
restored the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 13, 2023 15:55
renovate
bot
force-pushed
the
renovate/go-google.golang.org/grpc-vulnerability
branch
from
November 13, 2023 15:55
18927d0
to
2228de8
Compare
phisco
approved these changes
Nov 13, 2023
renovate
bot
deleted the
renovate/go-google.golang.org/grpc-vulnerability
branch
November 13, 2023 15:58
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.58.2
->v1.58.3
gRPC-Go HTTP/2 Rapid Reset vulnerability
GHSA-m425-mq94-257g
More information
Details
Impact
In affected releases of gRPC-Go, it is possible for an attacker to send HTTP/2 requests, cancel them, and send subsequent requests, which is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit.
Patches
This vulnerability was addressed by #6703 and has been included in patch releases: 1.56.3, 1.57.1, 1.58.3. It is also included in the latest release, 1.59.0.
Along with applying the patch, users should also ensure they are using the
grpc.MaxConcurrentStreams
server option to apply a limit to the server's resources used for any single connection.Workarounds
None.
References
#6703
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc
GHSA-m425-mq94-257g / GO-2023-2153
More information
Details
An attacker can send HTTP/2 requests, cancel them, and send subsequent requests. This is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit,
grpc.MaxConcurrentStreams
. This results in a denial of service due to resource consumption.Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
swift-nio-http2 vulnerable to HTTP/2 Stream Cancellation Attack
CVE-2023-44487 / GHSA-qppj-fm5r-hxr3
More information
Details
swift-nio-http2 is vulnerable to a denial-of-service vulnerability in which a malicious client can create and then reset a large number of HTTP/2 streams in a short period of time. This causes swift-nio-http2 to commit to a large amount of expensive work which it then throws away, including creating entirely new
Channel
s to serve the traffic. This can easily overwhelm anEventLoop
and prevent it from making forward progress.swift-nio-http2 1.28 contains a remediation for this issue that applies reset counter using a sliding window. This constrains the number of stream resets that may occur in a given window of time. Clients violating this limit will have their connections torn down. This allows clients to continue to cancel streams for legitimate reasons, while constraining malicious actors.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
grpc/grpc-go (google.golang.org/grpc)
v1.58.3
Compare Source
Security
server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)
In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.