Whilst the code was certainly in the build, the experiment enabling it was
disabled in 1.59 - so without extra effort to enable said experiment that
version is safe.

On Fri, Jan 17, 2025 at 1:27 PM 'Erin McNulty' via grpc.io <
grpc-io@googlegroups.com> wrote:

> Hi all,
>
> The record for CVE-2024-11407
> <https://www.cve.org/CVERecord?id=CVE-2024-11407> states that gRPC
> versions 1.60.0 through 1.66.1 are affected by this vulnerability, but it
> appears that the affected code appears on v1.59.x as well (link
> <https://github.com/grpc/grpc/blob/b22b8e6c8855f958afda436d9f1def216085d505/src/core/lib/event_engine/posix_engine/posix_endpoint.cc#L242>
> ).
>
> Is the record for the CVE incomplete? Or is there another factor that
> makes v1.59.x safe from this CVE?
>
> Thanks,
> - Erin McNulty
>
> --
> You received this message because you are subscribed to the Google Groups "
> grpc.io" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to grpc-io+unsubscr...@googlegroups.com.
> To view this discussion visit
> https://groups.google.com/d/msgid/grpc-io/ab7ee579-64e0-4f46-9445-eb6495826e73n%40googlegroups.com
> <https://groups.google.com/d/msgid/grpc-io/ab7ee579-64e0-4f46-9445-eb6495826e73n%40googlegroups.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"grpc.io" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to grpc-io+unsubscr...@googlegroups.com.
To view this discussion visit 
https://groups.google.com/d/msgid/grpc-io/CAAvp3oOJQ8Ou-DTLOfYAQ-%3DyWSg56LAMJEfLRb4FA0iu75aC5g%40mail.gmail.com.

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to