OCPBUGS-83940: bump gRPC-Go to v1.79.3#16443
Conversation
Fixes CVE-2026-33186: gRPC-Go authorization bypass due to improper HTTP/2 :path pseudo-header validation in versions prior to 1.79.3. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
|
@jhadvig: This pull request references Jira Issue OCPBUGS-83940, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@Leo6Leo: This PR has been marked as verified by DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jhadvig, Leo6Leo The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Built the console backend from this branch and ran it against a live OCP 4.23 nightly cluster (4.23.0-0.nightly-2026-05-14-045943). Build & Static Checks:
|
|
@jhadvig: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
693d97e
into
openshift:release-4.22
|
@jhadvig: Jira Issue OCPBUGS-83940: Some pull requests linked via external trackers have merged: The following pull request, linked via external tracker, has not merged:
All associated pull requests must be merged or unlinked from the Jira bug in order for it to move to the next state. Once unlinked, request a bug refresh with Jira Issue OCPBUGS-83940 has not been moved to the MODIFIED state. This PR is marked as verified. If the remaining PRs listed above are marked as verified before merging, the issue will automatically be moved to VERIFIED after all of the changes from the PRs are available in an accepted nightly payload. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Analysis / Root cause:
CVE-2026-33186: gRPC-Go versions prior to 1.79.3 accept HTTP/2 requests where the
:pathpseudo-header omits the mandatory leading slash (e.g.,Service/Methodinstead of/Service/Method). Authorization interceptors evaluate the raw, non-canonical path string, so "deny" rules for canonicalpaths fail to match — enabling an authorization bypass.
The console backend pulls
google.golang.org/grpcas an indirect dependency (no console Go code imports it directly). Practical risk is low, butthe bump is required for CVE compliance on the
openshift4/ose-console-rhel9component.Solution description:
google.golang.org/grpcfrom v1.72.2 to v1.79.3 (the fixed version)Test cases:
go build ./cmd/... ./pkg/...)go test ./pkg/... ./cmd/...)/assign @Leo6Leo