Skip to content

bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515)#39798

Merged
AkihiroSuda merged 2 commits intomoby:masterfrom
thaJeztah:bump_grpc
Sep 3, 2019
Merged

bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515)#39798
AkihiroSuda merged 2 commits intomoby:masterfrom
thaJeztah:bump_grpc

Conversation

@thaJeztah
Copy link
Copy Markdown
Member

@thaJeztah thaJeztah commented Aug 26, 2019

full diff: grpc/grpc-go@v1.20.1...v1.23.0

This update contains security fixes:

Other changes can be found in the release notes:
https://github.com/grpc/grpc-go/releases/tag/v1.23.0

Also updating containerd/ttrpc to get containerd/ttrpc#46 in;

full diff: containerd/ttrpc@699c4e4...92c8520

changes:

@thaJeztah
Copy link
Copy Markdown
Member Author

ping @dmcgowan @justincormack PTAL

@thaJeztah thaJeztah changed the title bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515) [WIP] bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515) Aug 26, 2019
@thaJeztah
Copy link
Copy Markdown
Member Author

marked as "WIP" as we need to be sure we can bump without breaking connections with containerd; see containerd/ttrpc#46 and containerd/containerd#3581

@thaJeztah thaJeztah changed the title [WIP] bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515) bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515) Aug 27, 2019
@thaJeztah thaJeztah changed the title bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515) [WIP] bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515) Aug 27, 2019
@thaJeztah
Copy link
Copy Markdown
Member Author

Marking as "WIP" again, pending containerd/ttrpc#46 (comment) and containerd/containerd#3586 (comment)

full diff: grpc/grpc-go@v1.20.1...v1.23.0

This update contains security fixes:

- transport: block reading frames when too many transport control frames are queued (grpc/grpc-go#2970)
  - Addresses CVE-2019-9512 (Ping Flood), CVE-2019-9514 (Reset Flood), and CVE-2019-9515 (Settings Flood).

Other changes can be found in the release notes:
https://github.com/grpc/grpc-go/releases/tag/v1.23.0

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
full diff: containerd/ttrpc@699c4e4...92c8520

changes:

- containerd/ttrpc#37 Handle EOF to prevent file descriptor leak
- containerd/ttrpc#38 Improve connection error handling
- containerd/ttrpc#40 Support headers
- containerd/ttrpc#41 Add client and server unary interceptors
- containerd/ttrpc#43 metadata as KeyValue type
- containerd/ttrpc#42 Refactor close handling for ttrpc clients
- containerd/ttrpc#44 Fix method full name generation
- containerd/ttrpc#46 Client.Call(): do not return error if no Status is set (gRPC v1.23 and up)
- containerd/ttrpc#49 Handle ok status

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
@thaJeztah
Copy link
Copy Markdown
Member Author

Updated ttrpc vendor to include containerd/ttrpc#49. Removing "WIP"

@thaJeztah thaJeztah changed the title [WIP] bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515) bump google.golang.org/grpc v1.23.0 (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515) Aug 28, 2019
@thaJeztah
Copy link
Copy Markdown
Member Author

ping @crosbymichael @estesp @justincormack PTAL

Copy link
Copy Markdown
Contributor

@estesp estesp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@thaJeztah
Copy link
Copy Markdown
Member Author

ping @crosbymichael @AkihiroSuda @justincormack PTAL

@AkihiroSuda AkihiroSuda merged commit 1d19062 into moby:master Sep 3, 2019
@thaJeztah thaJeztah deleted the bump_grpc branch September 3, 2019 10:05
@thaJeztah thaJeztah added this to the 20.03.0 milestone Apr 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants