CVE-2023-32732: Improper Neutralization
(updated )
gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for -bin
suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url
References
- github.com/advisories/GHSA-9hxf-ppjv-w6rq
- github.com/grpc/grpc/pull/32309
- github.com/grpc/grpc/releases/tag/v1.53.1
- github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-32732.yml
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/
- nvd.nist.gov/vuln/detail/CVE-2023-32732
Detect and mitigate CVE-2023-32732 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →