OCPBUGS-80870: CVE-2026-33186 openshift4/ose-thanos-rhel9: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation [openshift-4.21]#174
Conversation
|
Important Review skippedAuto reviews are disabled on base/target branches other than the default branch. Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
|
@danielmellado: This pull request references Jira Issue OCPBUGS-80870, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: danielmellado The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
…uthorization bypass due to improper HTTP/2 path validation [openshift-4.21] Signed-off-by: Daniel Mellado <dmellado@fedoraproject.org>
777da1b to
721cf24
Compare
|
/retest-required |
|
@danielmellado: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Changes
Bumps google.golang.org/grpc from v1.63.2 to v1.79.3 to fix CVE-2026-33186 (CVSS 9.1), an authorization bypass where gRPC-Go servers accepted HTTP/2 requests with a non-canonical :path (missing leading slash), causing path-based deny rules in authorization interceptors to be silently skipped. The previous pin to v1.63.2 for grpc/grpc-go#7314 is no longer needed as that was fixed in v1.66.0.