-
Notifications
You must be signed in to change notification settings - Fork 40
[release-4.20] OCPBUGS-80596: Bump google.golang.org/grpc to v1.79.3 #198
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release-4.20
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -6,7 +6,7 @@ toolchain go1.24.4 | |
|
|
||
| require ( | ||
| github.com/blang/semver/v4 v4.0.0 | ||
| github.com/go-logr/logr v1.4.2 | ||
| github.com/go-logr/logr v1.4.3 | ||
| github.com/openshift/api v0.0.0-20250710004639-926605d3338b | ||
| github.com/openshift/build-machinery-go v0.0.0-20250530140348-dc5b2804eeee | ||
| github.com/openshift/client-go v0.0.0-20250710075018-396b36f983ee | ||
|
|
@@ -17,9 +17,8 @@ require ( | |
| github.com/operator-framework/operator-registry v1.48.0 | ||
| github.com/spf13/cobra v1.9.1 | ||
| github.com/spf13/pflag v1.0.6 | ||
| github.com/stretchr/testify v1.10.0 | ||
| golang.org/x/net v0.40.0 | ||
| golang.org/x/text v0.26.0 | ||
| github.com/stretchr/testify v1.11.1 | ||
| golang.org/x/text v0.32.0 | ||
| helm.sh/helm/v3 v3.18.4 | ||
| k8s.io/api v0.33.2 | ||
| k8s.io/apiextensions-apiserver v0.33.2 | ||
|
|
@@ -32,7 +31,7 @@ require ( | |
| ) | ||
|
|
||
| require ( | ||
| cel.dev/expr v0.19.1 // indirect | ||
| cel.dev/expr v0.25.1 // indirect | ||
| github.com/Masterminds/semver/v3 v3.3.0 // indirect | ||
| github.com/Masterminds/squirrel v1.5.4 // indirect | ||
| github.com/NYTimes/gziphandler v1.1.1 // indirect | ||
|
|
@@ -98,29 +97,30 @@ require ( | |
| go.etcd.io/etcd/api/v3 v3.5.21 // indirect | ||
| go.etcd.io/etcd/client/pkg/v3 v3.5.21 // indirect | ||
| go.etcd.io/etcd/client/v3 v3.5.21 // indirect | ||
| go.opentelemetry.io/auto/sdk v1.1.0 // indirect | ||
| go.opentelemetry.io/auto/sdk v1.2.1 // indirect | ||
| go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.58.0 // indirect | ||
| go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.58.0 // indirect | ||
| go.opentelemetry.io/otel v1.33.0 // indirect | ||
| go.opentelemetry.io/otel v1.39.0 // indirect | ||
| go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.33.0 // indirect | ||
| go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.33.0 // indirect | ||
| go.opentelemetry.io/otel/metric v1.33.0 // indirect | ||
| go.opentelemetry.io/otel/sdk v1.33.0 // indirect | ||
| go.opentelemetry.io/otel/trace v1.33.0 // indirect | ||
| go.opentelemetry.io/otel/metric v1.39.0 // indirect | ||
| go.opentelemetry.io/otel/sdk v1.39.0 // indirect | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🧩 Analysis chain🏁 Script executed: #!/bin/bash
# Check for security advisories and patched versions for go.opentelemetry.io/otel/sdk
echo "=== Checking for security advisories on go.opentelemetry.io/otel/sdk ==="
gh api graphql -f query='
{
securityVulnerabilities(first: 10, ecosystem: GO, package: "go.opentelemetry.io/otel/sdk") {
nodes {
advisory {
summary
severity
publishedAt
ghsaId
}
vulnerableVersionRange
firstPatchedVersion {
identifier
}
}
}
}'
echo -e "\n=== Checking which direct dependencies require go.opentelemetry.io/otel/sdk ==="
go mod graph | grep 'go.opentelemetry.io/otel/sdk@' | head -20Repository: openshift/cluster-olm-operator Length of output: 2425 Update This is a direct dependency (not indirect) that is vulnerable to two HIGH severity arbitrary code execution vulnerabilities:
Version 1.39.0 is vulnerable to both. Upgrade to 1.43.0 to address both vulnerabilities. 🧰 Tools🪛 OSV Scanner (2.3.6)[HIGH] 107-107: go.opentelemetry.io/otel/sdk 1.39.0: OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking in go.opentelemetry.io/otel/sdk (GO-2026-4394) [HIGH] 107-107: go.opentelemetry.io/otel/sdk 1.39.0: OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking [HIGH] 107-107: go.opentelemetry.io/otel/sdk 1.39.0: opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking 🤖 Prompt for AI Agents |
||
| go.opentelemetry.io/otel/trace v1.39.0 // indirect | ||
| go.opentelemetry.io/proto/otlp v1.4.0 // indirect | ||
| go.uber.org/multierr v1.11.0 // indirect | ||
| go.uber.org/zap v1.27.0 // indirect | ||
| golang.org/x/crypto v0.39.0 // indirect | ||
| golang.org/x/crypto v0.46.0 // indirect | ||
| golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 // indirect | ||
| golang.org/x/oauth2 v0.28.0 // indirect | ||
| golang.org/x/sync v0.15.0 // indirect | ||
| golang.org/x/sys v0.33.0 // indirect | ||
| golang.org/x/term v0.32.0 // indirect | ||
| golang.org/x/net v0.48.0 // indirect | ||
| golang.org/x/oauth2 v0.34.0 // indirect | ||
| golang.org/x/sync v0.19.0 // indirect | ||
| golang.org/x/sys v0.39.0 // indirect | ||
| golang.org/x/term v0.38.0 // indirect | ||
| golang.org/x/time v0.9.0 // indirect | ||
| google.golang.org/genproto/googleapis/api v0.0.0-20241209162323-e6fa225c2576 // indirect | ||
| google.golang.org/genproto/googleapis/rpc v0.0.0-20241209162323-e6fa225c2576 // indirect | ||
| google.golang.org/grpc v1.68.1 // indirect | ||
| google.golang.org/protobuf v1.36.5 // indirect | ||
| google.golang.org/genproto/googleapis/api v0.0.0-20251202230838-ff82c1b0f217 // indirect | ||
| google.golang.org/genproto/googleapis/rpc v0.0.0-20251202230838-ff82c1b0f217 // indirect | ||
| google.golang.org/grpc v1.79.3 // indirect | ||
| google.golang.org/protobuf v1.36.10 // indirect | ||
| gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect | ||
| gopkg.in/inf.v0 v0.9.1 // indirect | ||
| gopkg.in/natefinch/lumberjack.v2 v2.2.1 // indirect | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,2 +1,2 @@ | ||
| 7.0.1 | ||
| 7.3.2 | ||
| # Keep this pinned version in parity with cel-go |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
🏁 Script executed:
Repository: openshift/cluster-olm-operator
Length of output: 2144
Upgrade
go.opentelemetry.io/otelto v1.41.0 or higher to address HIGH severity DoS vulnerability.The vulnerability GHSA-mh2q-q3fh-2475 is confirmed: remote DoS amplification via multi-value
baggageheader extraction causing excessive allocations affects versions 1.36.0–1.40.0. The current v1.39.0 is vulnerable. Patched version 1.41.0 is available.Update the dependency in go.mod to
go.opentelemetry.io/otel v1.41.0. This will likely resolve the same vulnerability in transitive dependencies as well (library-go, operator-framework packages, and auto/sdk are pinned to older versions and will inherit the fix).🧰 Tools
🪛 OSV Scanner (2.3.6)
[HIGH] 103-103: go.opentelemetry.io/otel 1.39.0: OpenTelemetry-Go: multi-value
baggageheader extraction causes excessive allocations (remote dos amplification)(GHSA-mh2q-q3fh-2475)
🤖 Prompt for AI Agents