Skip to content

Fix CVE-2026-33186: Upgrade grpc-go to v1.79.3#15

Open
chainloop-development[bot] wants to merge 1 commit intomainfrom
chainloop/fix-cve-2026-33186-20260422-013808
Open

Fix CVE-2026-33186: Upgrade grpc-go to v1.79.3#15
chainloop-development[bot] wants to merge 1 commit intomainfrom
chainloop/fix-cve-2026-33186-20260422-013808

Conversation

@chainloop-development
Copy link
Copy Markdown

Summary

Upgraded google.golang.org/grpc from v1.63.2 to v1.79.3 to address a critical authorization bypass vulnerability.

Vulnerability Fixed

CVE-2026-33186 (GHSA-p77j-4mvh-x3m3) - Severity: CRITICAL (CVSS 9.1)

gRPC-Go has an authorization bypass vulnerability via missing leading slash in the HTTP/2 :path pseudo-header. Versions prior to v1.79.3 were too lenient in routing logic, accepting requests where the :path omitted the mandatory leading slash (e.g., Service/Method instead of /Service/Method). This could allow attackers to bypass path-based authorization policies in gRPC servers using interceptors with deny rules and permissive fallback allow rules.

Changes Made

  • Updated google.golang.org/grpc from v1.63.2 to v1.79.3 in chainloop-demo/dagger/src/go.mod
  • Updated checksums in chainloop-demo/dagger/src/go.sum to match the patched version
  • The patched version v1.79.3 properly validates the :path pseudo-header format, preventing the authorization bypass

References

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants