--
You received this message because you are subscribed to the Google Groups "grpc.io" group.
To unsubscribe from this group and stop receiving emails from it, send an email to grpc-io+u...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/grpc-io/850291a3-0eef-4455-8748-1cacb3a2ceda%40googlegroups.com.
Hi,
Below please find the details of the vulnerability with an open PR - https://github.com/grpc/grpc/pull/19766 found by our system architect – Lev Pachmanov (CC’d).
The problem is in the src/core/lib/iomgr/tcp_server_custom.cc: tcp_server_add_port
When the initializing of the socket object fails:
|
|
||
|
grpc_custom_socket_vtable->init(socket, family); |
|
|
The error is value is not checked causing reference to an invalid pointer later in add_socket_to_server.
We encountered this scenario running on a platform where getaddrinfo returns an IPv6 address while socket(AF_INET6, …) returns EAFNOSUPPORT.
This vulnerability might be exploited using common null pointer dereferences.
Hope this helps.
Uri + Lev
--
You received this message because you are subscribed to a topic in the Google Groups "grpc.io" group.
To unsubscribe from this topic, visit
https://groups.google.com/d/topic/grpc-io/xAzkJAWBkmc/unsubscribe.
To unsubscribe from this group and all its topics, send an email to
grpc-io+u...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/grpc-io/e43d36ab-5a99-46bc-b654-a24ea984a6a8%40googlegroups.com.
Hi Jiangtao,
Wanted to follow up and see if you had a chance to evaluate the impact and if a CVE will be opened.
Thanks,
Uri