Skip to content

OCPBUGS-80804: Bump google.golang.org/grpc to v1.79.3 to fix CVE-2026-33186#106

Open
amitesh1201 wants to merge 1 commit into
openshift:release-4.21from
amitesh1201:fix-CVE-2026-33186-4.21
Open

OCPBUGS-80804: Bump google.golang.org/grpc to v1.79.3 to fix CVE-2026-33186#106
amitesh1201 wants to merge 1 commit into
openshift:release-4.21from
amitesh1201:fix-CVE-2026-33186-4.21

Conversation

@amitesh1201
Copy link
Copy Markdown

Summary

  • CVE: CVE-2026-33186 — gRPC-Go authorization bypass via malformed :path pseudo-header (CVSS 9.1)
  • Component: cloud-provider-gcp (Cloud Controller Manager)
  • Branch: release-4.21
  • Package: google.golang.org/grpc v1.72.1 → v1.79.3
  • Risk Level: LOW — indirect dependency, component does not import or use grpc directly

Changes

  • Dependency version bump in go.mod and providers/go.mod
  • Vendor directory updated via openshift-hack/update-vendor.sh

Test Plan

  • openshift-hack/verify-vendor.sh passes
  • openshift-hack/test-unit.sh passes

@openshift-ci-robot openshift-ci-robot added jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Apr 14, 2026
@openshift-ci-robot
Copy link
Copy Markdown

@amitesh1201: This pull request references Jira Issue OCPBUGS-80804, which is invalid:

  • release note text must be set and not match the template OR release note type must be set to "Release Note Not Required". For more information you can reference the OpenShift Bug Process.
  • expected Jira Issue OCPBUGS-80804 to depend on a bug targeting a version in 4.22.0 and in one of the following states: VERIFIED, RELEASE PENDING, CLOSED (ERRATA), CLOSED (CURRENT RELEASE), CLOSED (DONE), CLOSED (DONE-ERRATA), but no dependents were found

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

Details

In response to this:

Summary

  • CVE: CVE-2026-33186 — gRPC-Go authorization bypass via malformed :path pseudo-header (CVSS 9.1)
  • Component: cloud-provider-gcp (Cloud Controller Manager)
  • Branch: release-4.21
  • Package: google.golang.org/grpc v1.72.1 → v1.79.3
  • Risk Level: LOW — indirect dependency, component does not import or use grpc directly

Changes

  • Dependency version bump in go.mod and providers/go.mod
  • Vendor directory updated via openshift-hack/update-vendor.sh

Test Plan

  • openshift-hack/verify-vendor.sh passes
  • openshift-hack/test-unit.sh passes

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci Bot requested review from RadekManak and nrb April 14, 2026 10:11
@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Apr 14, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign nrb for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented Apr 14, 2026

Important

Review skipped

Auto reviews are disabled on base/target branches other than the default branch.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

⚙️ Run configuration

Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml

Review profile: CHILL

Plan: Pro Plus

Run ID: 6d8a64c2-eb59-485f-86da-cadc33f8b529

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Use the checkbox below for a quick retry:

  • 🔍 Trigger review
✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

@amitesh1201 amitesh1201 force-pushed the fix-CVE-2026-33186-4.21 branch from 64c2dc5 to f1a5991 Compare April 14, 2026 15:26
@amitesh1201
Copy link
Copy Markdown
Author

/retest-required

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Apr 14, 2026

@amitesh1201: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants