CVE-2024-37168 Affecting jitsucom-jitsu package, versions <2.7.0-r1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-JITSUCOMJITSU-7252153
- published 14 Jun 2024
- disclosed 10 Jun 2024
Introduced: 10 Jun 2024
CVE-2024-37168 Open this link in a new tabHow to fix?
Upgrade Wolfi
jitsucom-jitsu
to version 2.7.0-r1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream jitsucom-jitsu
package and not the jitsucom-jitsu
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
@grpc/grps-js implements the core functionality of gRPC purely in JavaScript, without a C++ addon. Prior to versions 1.10.9, 1.9.15, and 1.8.22, there are two separate code paths in which memory can be allocated per message in excess of the grpc.max_receive_message_length
channel option: If an incoming message has a size on the wire greater than the configured limit, the entire message is buffered before it is discarded; and/or if an incoming message has a size within the limit on the wire but decompresses to a size greater than the limit, the entire message is decompressed into memory, and on the server is not discarded. This has been patched in versions 1.10.9, 1.9.15, and 1.8.22.
References
- https://github.com/grpc/grpc-node/commit/08b0422dae56467ecae1007e899efe66a8c4a650
- https://github.com/grpc/grpc-node/commit/674f4e351a619fd4532f84ae6dff96b8ee4e1ed3
- https://github.com/grpc/grpc-node/commit/a8a020339c7eab1347a343a512ad17a4aea4bfdb
- https://github.com/grpc/grpc-node/security/advisories/GHSA-7v5v-9h63-cj86