Safety vulnerability ID: 71994
The information on this page was manually curated by our Cybersecurity Intelligence Team.
There exists an vulnerability causing an abort() to be called in gRPC. The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB.
Latest version: 1.68.1
HTTP/2-based RPC framework
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application