Skip to content

OCPBUGS-80870: CVE-2026-33186 openshift4/ose-thanos-rhel9: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation [openshift-4.21]#174

Open
danielmellado wants to merge 1 commit intoopenshift:release-4.21from
danielmellado:CVE-2026-33186_gRPC-Go
Open

OCPBUGS-80870: CVE-2026-33186 openshift4/ose-thanos-rhel9: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation [openshift-4.21]#174
danielmellado wants to merge 1 commit intoopenshift:release-4.21from
danielmellado:CVE-2026-33186_gRPC-Go

Conversation

@danielmellado
Copy link
Copy Markdown

  • I added CHANGELOG entry for this change.
  • Change is not relevant to the end user.

Changes

Bumps google.golang.org/grpc from v1.63.2 to v1.79.3 to fix CVE-2026-33186 (CVSS 9.1), an authorization bypass where gRPC-Go servers accepted HTTP/2 requests with a non-canonical :path (missing leading slash), causing path-based deny rules in authorization interceptors to be silently skipped. The previous pin to v1.63.2 for grpc/grpc-go#7314 is no longer needed as that was fixed in v1.66.0.

@openshift-ci-robot openshift-ci-robot added jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Mar 30, 2026
@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Mar 30, 2026

Important

Review skipped

Auto reviews are disabled on base/target branches other than the default branch.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: d6ef3b8b-46ad-48f9-9061-4d2c66e99a9b

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Use the checkbox below for a quick retry:

  • 🔍 Trigger review
✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci-robot
Copy link
Copy Markdown

@danielmellado: This pull request references Jira Issue OCPBUGS-80870, which is invalid:

  • release note text must be set and not match the template OR release note type must be set to "Release Note Not Required". For more information you can reference the OpenShift Bug Process.
  • expected Jira Issue OCPBUGS-80870 to depend on a bug targeting a version in 4.22.0 and in one of the following states: VERIFIED, RELEASE PENDING, CLOSED (ERRATA), CLOSED (CURRENT RELEASE), CLOSED (DONE), CLOSED (DONE-ERRATA), but no dependents were found

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

Details

In response to this:

  • I added CHANGELOG entry for this change.
  • Change is not relevant to the end user.

Changes

Bumps google.golang.org/grpc from v1.63.2 to v1.79.3 to fix CVE-2026-33186 (CVSS 9.1), an authorization bypass where gRPC-Go servers accepted HTTP/2 requests with a non-canonical :path (missing leading slash), causing path-based deny rules in authorization interceptors to be silently skipped. The previous pin to v1.63.2 for grpc/grpc-go#7314 is no longer needed as that was fixed in v1.66.0.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci
Copy link
Copy Markdown

openshift-ci bot commented Mar 30, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: danielmellado

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot requested review from jan--f and machine424 March 30, 2026 07:09
@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 30, 2026
…uthorization bypass due to improper HTTP/2 path validation [openshift-4.21]

Signed-off-by: Daniel Mellado <dmellado@fedoraproject.org>
@danielmellado danielmellado force-pushed the CVE-2026-33186_gRPC-Go branch from 777da1b to 721cf24 Compare March 30, 2026 07:22
@danielmellado
Copy link
Copy Markdown
Author

/retest-required

@openshift-ci
Copy link
Copy Markdown

openshift-ci bot commented Mar 30, 2026

@danielmellado: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants