fix: upgrade google.golang.org/grpc to v1.79.3 (auth bypass CVE)#39
Closed
TejaswiniV1 wants to merge 1 commit into
Closed
fix: upgrade google.golang.org/grpc to v1.79.3 (auth bypass CVE)#39TejaswiniV1 wants to merge 1 commit into
TejaswiniV1 wants to merge 1 commit into
Conversation
|
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement Learn more about why HashiCorp requires a CLA and what the CLA includes Have you signed the CLA already but the status is still pending? Recheck it. |
There was a problem hiding this comment.
Pull request overview
Upgrades the project’s gRPC-Go dependency to a patched version to mitigate a reported authorization bypass (CVE‑2026‑33186), along with the resulting module metadata updates.
Changes:
- Bumps
google.golang.org/grpctov1.79.3(and updates relatedgoogle.golang.org/protobuf). - Updates transitive dependencies as a result of
go mod tidy. - Adjusts the
godirective ingo.modto1.24.0.
Reviewed changes
Copilot reviewed 1 out of 2 changed files in this pull request and generated no comments.
| File | Description |
|---|---|
| go.mod | Updates gRPC-Go (and other indirect deps) to the intended fixed versions. |
| go.sum | Refreshes dependency checksums to match the upgraded direct/transitive module set. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
What does this PR do ?
This PR addresses a critical authorization bypass vulnerability in gRPC‑Go (CVE‑2026‑33186).
Older versions of gRPC‑Go allowed malformed HTTP/2 :path values without a leading slash, which could bypass path‑based authorization rules under certain policy configurations.
Fix :
1.Upgraded google.golang.org/grpc from v1.56.3 to v1.79.3
2.This version rejects malformed :path headers before routing or authorization logic runs, fully mitigating the vulnerability upstream
3.No application‑level logic changes were required
Key Changes :
1.Dependency upgrade: google.golang.org/grpc v1.79.3
2.Related transitive dependency updates via go mod tidy
3.No functional or behavioral changes to plugin logic
Verification
go build ./...- completed successfullygo test ./...- completed successfully (no test files present)Ticket : SECVULN-40751