Fix : upgrade grpc to v1.79.3 to fix CVE auth bypass (VAULT-44204)#42
Closed
TejaswiniV1 wants to merge 1 commit into
Closed
Fix : upgrade grpc to v1.79.3 to fix CVE auth bypass (VAULT-44204)#42TejaswiniV1 wants to merge 1 commit into
TejaswiniV1 wants to merge 1 commit into
Conversation
There was a problem hiding this comment.
Pull request overview
This PR updates the module’s gRPC-Go dependency to mitigate an authorization bypass vulnerability related to malformed HTTP/2 :path handling (VAULT-44204 / CVE-2026-33186), primarily via dependency version bumps and a go mod tidy refresh.
Changes:
- Bump
google.golang.org/grpctov1.79.3(indirect) and refresh related transitive dependencies. - Update several
golang.org/x/*and protobuf-related module versions viago mod tidy. - Adjust the
godirective ingo.modfrom1.24to1.24.0.
Reviewed changes
Copilot reviewed 1 out of 2 changed files in this pull request and generated no comments.
| File | Description |
|---|---|
| go.mod | Updates Go version directive formatting and upgrades gRPC/protobuf + several transitive dependencies. |
| go.sum | Regenerates module checksums to match the upgraded dependency graph. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Author
|
As this plugin has been officially deprecated in Vault 1.15 and removed in Vault 1.17, it is no longer actively maintained or supported. Given this, we will not be moving forward with this PR and are closing it. Reference: link |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
What does this PR do ?
This PR addresses a critical authorization bypass vulnerability in gRPC‑Go (CVE‑2026‑33186).
Older versions of gRPC‑Go allowed malformed HTTP/2 :path values without a leading slash, which could bypass path‑based authorization rules under certain policy configurations.
Fix :
1.Upgraded google.golang.org/grpc from v1.56.3 to v1.79.3
2.This version rejects malformed :path headers before routing or authorization logic runs, fully mitigating the vulnerability upstream
3.No application‑level logic changes were required
Key Changes :
1.Dependency upgrade: google.golang.org/grpc v1.79.3
2.Related transitive dependency updates via go mod tidy
3.No functional or behavioral changes to plugin logic
Verification
go build ./... - completed successfully
go test ./... - completed successfully (no test files present)
Ticket : VAULT-44204