Skip to content

Commit ecc37ff

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@4eed0d4
1 parent 0ca178f commit ecc37ff

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2023-4785 (grpc): Denial of Service Vulnerability in gRPC TCP Server (Posix-compatible
4+
platforms)'
5+
comments: false
6+
categories:
7+
- grpc
8+
advisory:
9+
gem: grpc
10+
cve: 2023-4785
11+
ghsa: p25m-jpj4-qcrr
12+
url: https://groups.google.com/g/grpc-io/c/LlLkB1CeE4U
13+
title: Denial of Service Vulnerability in gRPC TCP Server (Posix-compatible platforms)
14+
date: 2023-09-13
15+
description: |
16+
Lack of error handling in the TCP server in Google's gRPC starting
17+
version 1.23 on posix-compatible platforms (ex. Linux) allows an
18+
attacker to cause a denial of service by initiating a significant
19+
number of connections with the server.
20+
21+
Note that gRPC C++ Python, and Ruby are affected, but
22+
gRPC Java and Go are NOT affected. 
23+
cvss_v3: 7.5
24+
unaffected_versions:
25+
- "< 1.53.0"
26+
patched_versions:
27+
- "~> 1.53.2"
28+
- "~> 1.54.3"
29+
- "~> 1.55.3"
30+
- ">= 1.56.2"
31+
related:
32+
url:
33+
- https://nvd.nist.gov/vuln/detail/CVE-2023-4785
34+
- https://groups.google.com/g/grpc-io/c/LlLkB1CeE4U
35+
- https://rubygems.org/gems/grpc/versions/1.53.2
36+
- https://rubygems.org/gems/grpc/versions/1.54.3
37+
- https://rubygems.org/gems/grpc/versions/1.55.3
38+
- https://rubygems.org/gems/grpc/versions/1.56.2
39+
- https://github.com/grpc/grpc/pull/33656
40+
- https://github.com/grpc/grpc/pull/33667
41+
- https://github.com/grpc/grpc/pull/33669
42+
- https://github.com/grpc/grpc/pull/33670
43+
- https://github.com/grpc/grpc/pull/33672
44+
- https://github.com/advisories/GHSA-p25m-jpj4-qcrr
45+
---

0 commit comments

Comments
 (0)