|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-1428: grpc: There exists an vulnerability causing an abort() to be called in gRPC | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Gianluca Gabrielli <gianluca.gabrielli> |
| Component: | Incidents | Assignee: | SUSE Public Cloud Maintainer <public-cloud-maintainers> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P3 - Medium | CC: | adrian.glaubitz, public-cloud-maintainers, security-team, stoyan.manolov |
| Version: | unspecified | Flags: | stoyan.manolov:
needinfo?
(public-cloud-maintainers) |
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/368983/ | ||
| Whiteboard: | |||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Gianluca Gabrielli
2023-06-09 14:05:50 UTC
Affected packages: - SUSE:SLE-15-SP1:Update/grpc - SUSE:SLE-15-SP2:Update/grpc Looking the entries on both NIST and CVE.org, it seems this affects grpc versions >= 1.51 and < 1.53 while we're shipping version 1.25 at the moment. I also verified that the suggested patch does not apply as the code being patched doesn't exist in 1.25 which is currently in SLE-15-SP1 and SLE-15-SP2. So, I think the grpc versions in SLE are not affected. Tumbleweed ships 1.56 which is also not affected. You are right, thanks for your feedback. Closing. |