Skip to content

chore(core): cve mitigation 15-04-2026 for release 1.7.1#2219

Merged
LopatinDmitr merged 1 commit intorelease-1.7from
fix-cve-for-release-1-7
Apr 16, 2026
Merged

chore(core): cve mitigation 15-04-2026 for release 1.7.1#2219
LopatinDmitr merged 1 commit intorelease-1.7from
fix-cve-for-release-1-7

Conversation

@LopatinDmitr
Copy link
Copy Markdown
Contributor

@LopatinDmitr LopatinDmitr commented Apr 15, 2026

Description

  • CRITICAL https://github.com/advisories/GHSA-p77j-4mvh-x3m3 — google.golang.org/grpc/grpc-go: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation.
  • HIGH https://github.com/advisories/GHSA-hfvc-g4fc-pqhx — opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking.
  • HIGH https://github.com/advisories/GHSA-78h2-9frx-2jm8 — Go JOSE: Denial of Service via crafted JSON Web Encryption.
  • HIGH https://github.com/advisories/GHSA-x744-4wpc-v9h2 — Moby: Authorization bypass vulnerability.
  • HIGH https://github.com/advisories/GHSA-j3gx-2473-5fp8 — net/url: Incorrect parsing of IPv6 host literals in net/url.
  • HIGH https://github.com/advisories/GHSA-m4pr-4j3g-9v7v — During chain building, the amount of work that is done is not properly limited.
  • HIGH https://github.com/advisories/GHSA-xj38-jxc5-rppx — golang internal/syscall/unix: Root.Chmod can follow symlinks out of the root.
  • MEDIUM https://github.com/advisories/GHSA-hxv8-4j4r-cqgv — Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic.
  • MEDIUM https://github.com/advisories/GHSA-pxq6-2prw-chj9 — Moby: Privilege validation bypass during plugin installation.
  • MEDIUM https://github.com/advisories/GHSA-j4j7-vw47-rhfqhtml/template: URLs in meta content attribute actions are not escaped.
  • MEDIUM https://github.com/advisories/GHSA-gjvh-7jh8-7xhm — Go crypto/x509: Denial of Service via inefficient certificate chain validation.
  • MEDIUM https://github.com/advisories/GHSA-x4jj-h2v8-hqqv — Go archive/tar package: Denial of Service via maliciously-crafted archive.
  • MEDIUM https://github.com/advisories/GHSA-7mr4-xjxg-34g6html/template: Cross-Site Scripting (XSS) via improper context and brace depth handling.
  • LOW https://github.com/advisories/GHSA-rv83-g57w-fr8jos: FileInfo can escape from a Root in golang os module.
  • UNKNOWN https://github.com/advisories/GHSA-jrg3-gfjw-hm96 — If one side of the TLS connection sends multiple key update messages, connection handling may be unsafe.

Checklist

  • The code is covered by unit tests.
  • e2e tests passed.
  • Documentation updated according to the changes.
  • Changes were tested in the Kubernetes cluster manually.

Changelog entries

section: core
type: chore
summary: |
  Fixed vulnerability:
  - CVE-2026-32283
  - CVE-2026-27139
  - CVE-2026-32289
  - CVE-2026-32288
  - CVE-2026-32281
  - CVE-2026-27142
  - CVE-2026-33997
  - CVE-2026-33726
  - CVE-2026-32282
  - CVE-2026-32280
  - CVE-2026-25679
  - CVE-2026-34040
  - CVE-2026-34986
  - CVE-2026-39883
  - CVE-2026-33186

- **CRITICAL** `CVE-2026-33186` — google.golang.org/grpc/grpc-go: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation.
- **HIGH** `CVE-2026-39883` — opentelemetry-go: BSD `kenv` command not using absolute path enables PATH hijacking.
- **HIGH** `CVE-2026-34986` — Go JOSE: Denial of Service via crafted JSON Web Encryption.
- **HIGH** `CVE-2026-34040` — Moby: Authorization bypass vulnerability.
- **HIGH** `CVE-2026-25679` — net/url: Incorrect parsing of IPv6 host literals in `net/url`.
- **HIGH** `CVE-2026-32280` — During chain building, the amount of work that is done is not properly limited.
- **HIGH** `CVE-2026-32282` — golang `internal/syscall/unix`: `Root.Chmod` can follow symlinks out of the root.
- **MEDIUM** `CVE-2026-33726` — Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic.
- **MEDIUM** `CVE-2026-33997` — Moby: Privilege validation bypass during plugin installation.
- **MEDIUM** `CVE-2026-27142` — `html/template`: URLs in meta content attribute actions are not escaped.
- **MEDIUM** `CVE-2026-32281` — Go `crypto/x509`: Denial of Service via inefficient certificate chain validation.
- **MEDIUM** `CVE-2026-32288` — Go `archive/tar` package: Denial of Service via maliciously-crafted archive.
- **MEDIUM** `CVE-2026-32289` — `html/template`: Cross-Site Scripting (XSS) via improper context and brace depth handling.
- **LOW** `CVE-2026-27139` — `os`: `FileInfo` can escape from a Root in golang `os` module.
- **UNKNOWN** `CVE-2026-32283` — If one side of the TLS connection sends multiple key update messages, connection handling may be unsafe.

Signed-off-by: Dmitry Lopatin <dmitry.lopatin@flant.com>
@LopatinDmitr LopatinDmitr force-pushed the fix-cve-for-release-1-7 branch from 0185cba to c8afa47 Compare April 16, 2026 07:50
@LopatinDmitr LopatinDmitr added the validation/skip/doc_changes Skip doc changes validation label Apr 16, 2026
@LopatinDmitr LopatinDmitr marked this pull request as ready for review April 16, 2026 08:57
@LopatinDmitr LopatinDmitr added this to the v1.7.1 milestone Apr 16, 2026
@LopatinDmitr LopatinDmitr merged commit e3b0877 into release-1.7 Apr 16, 2026
44 of 53 checks passed
@LopatinDmitr LopatinDmitr deleted the fix-cve-for-release-1-7 branch April 16, 2026 14:21
This was referenced Apr 20, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

validation/skip/doc_changes Skip doc changes validation

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants