Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00andjLXcyaGMtNzhxds4AA_6F
Tonic has remotely exploitable denial of service vulnerability
Impact
note: this only affects v0.12.0 - v0.12.2
When using tonic::transport::Server
there is a remote DoS attack that can cause the server to exit cleanly on accepting a tcp/tls stream. This can be triggered via causing the accept call to error out with errors there were not covered correctly causing the accept loop to exit.
More information can be found here
Patches
Upgrading to tonic 0.12.3
and above contains the fix.
Workarounds
A custom accept loop is a possible workaround.
Permalink: https://github.com/advisories/GHSA-4jwc-w2hc-78qvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00andjLXcyaGMtNzhxds4AA_6F
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 months ago
Updated: about 2 months ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Identifiers: GHSA-4jwc-w2hc-78qv, CVE-2024-47609
References:
- https://github.com/hyperium/tonic/security/advisories/GHSA-4jwc-w2hc-78qv
- https://nvd.nist.gov/vuln/detail/CVE-2024-47609
- https://github.com/hyperium/tonic/issues/1897
- https://github.com/hyperium/tonic/commit/a4472a86f3290e60c7c01348b7e6a8164d6e7e48
- https://rustsec.org/advisories/RUSTSEC-2024-0376.html
- https://github.com/advisories/GHSA-4jwc-w2hc-78qv
Blast Radius: 19.0
Affected Packages
cargo:tonic
Dependent packages: 866Dependent repositories: 3,853
Downloads: 79,604,758 total
Affected Version Ranges: >= 0.12.0, < 0.12.3
Fixed in: 0.12.3
All affected versions: 0.12.0, 0.12.1, 0.12.2
All unaffected versions: 0.0.0, 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.2.2, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.5.0, 0.5.1, 0.5.2, 0.6.0, 0.6.1, 0.6.2, 0.7.0, 0.7.1, 0.7.2, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.9.0, 0.9.1, 0.9.2, 0.10.0, 0.10.1, 0.10.2, 0.11.0, 0.12.3