-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTTP/2 Security Vulnerabilities #1245
Comments
Thanks for opening this issue! I believe we've addressed these with #1237. 🤔 Haven't we? 😃 |
That last comment from me was re: the internal gRPC APIs. The other HTTP2 APIs, both internal and external, are being worked on:
|
☝️ sorry for that, we've crossed wires when I wanted to fix the typo 😄 |
@srenatus thanks for the quick reply && typo fix! Looks like 3 of the 8 reported CVEs were taken care of as part of the 1.23.0 grpc-go release. Those 3 being:
Another 3 are covered at the proxy/load balancer (nginx):
I'm not sure if the other CVEs not covered are incarnations of the 6 that were fixed these are still not discussed anywhere:
Forgive me, I'm trying to sort through all this. 🙈 |
Oh, it's super helpful that you're doing, and sharing this! 🎈After all, you can imagine that we're frantically bumping dependencies in many places, and it's good to know someone is keeping calm, watchful eye on the situation 😉 |
Update the latest harts published to the
So, this won't make it into Monday's release, I suspect; but it'll be in the next one. |
I've added a TODO to look into notifications-service which is elixir based and thus wouldn't have a fix included in what we've pushed currently. |
According to the |
Bring in updated grpc, protobuf, and cowboy Should address the remaining of #1245 Signed-off-by: Jay Mundrawala <jmundrawala@chef.io>
Bring in updated grpc, protobuf, and cowboy Should address the remaining of #1245 Signed-off-by: Jay Mundrawala <jmundrawala@chef.io>
Bring in updated grpc, protobuf, and cowboy Should address the remaining of #1245 Signed-off-by: Jay Mundrawala <jmundrawala@chef.io>
Bring in updated grpc, protobuf, and cowboy. The new protobuf library changed default enum values. Unfortunately, both atoms and integers are allowed, and there's no easy way to enforce consistency. Should address the remaining of #1245 Signed-off-by: Jay Mundrawala <jmundrawala@chef.io>
* Update notifications service dependencies Bring in updated grpc, protobuf, and cowboy. The new protobuf library changed default enum values. Unfortunately, both atoms and integers are allowed, and there's no easy way to enforce consistency. Should address the remaining of #1245 Signed-off-by: Jay Mundrawala <jmundrawala@chef.io>
@skylerto we addressed the last part of this issue in the latest release with this work let us know if you have any more concerns |
Looks great, thanks so much @susanev! |
Security vulnerabilities were reported with HTTP/2 implementations, gRPC being one of them. I know that this software makes extensive use of gRPC for internal service communications and wanted to bring it up as it could effect some of our clients. Looking for feedback on how the automate team might be addressing these vulnerabilities.
https://www.kb.cert.org/vuls/id/605641/
Describe the bug
Exploiting gRPC connections can be exploited with denial-of-service attacks causing unexpected resource consumption and/or service failures.
To Reproduce
Implement any of the issues brought up in this document: https://www.kb.cert.org/vuls/id/605641/
Expected behavior
Services should mitigate DOS attacks.
Screenshots
N/A
Versions (please complete the following information):
N/A
Additional context
Following reports:
The text was updated successfully, but these errors were encountered: