Skip to content

build(deps): Bump google.golang.org/grpc from 1.79.2 to 1.79.3#3181

Merged
julienrbrt merged 3 commits intomainfrom
dependabot/go_modules/google.golang.org/grpc-1.79.3
Mar 20, 2026
Merged

build(deps): Bump google.golang.org/grpc from 1.79.2 to 1.79.3#3181
julienrbrt merged 3 commits intomainfrom
dependabot/go_modules/google.golang.org/grpc-1.79.3

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Mar 19, 2026

Bumps google.golang.org/grpc from 1.79.2 to 1.79.3.

Release notes

Sourced from google.golang.org/grpc's releases.

Release 1.79.3

Security

  • server: fix an authorization bypass where malformed :path headers (missing the leading slash) could bypass path-based restricted "deny" rules in interceptors like grpc/authz. Any request with a non-canonical path is now immediately rejected with an Unimplemented error. (#8981)
Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.79.2 to 1.79.3.
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.79.2...v1.79.3)

---
updated-dependencies:
- dependency-name: google.golang.org/grpc
  dependency-version: 1.79.3
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@julienrbrt julienrbrt enabled auto-merge March 20, 2026 14:32
@github-actions
Copy link
Contributor

The latest Buf updates on your PR. Results from workflow CI / buf-check (pull_request).

BuildFormatLintBreakingUpdated (UTC)
✅ passed⏩ skipped✅ passed✅ passedMar 20, 2026, 2:33 PM

@claude
Copy link
Contributor

claude bot commented Mar 20, 2026

Claude finished @julienrbrt's task in 1m 17s —— View job


Code Review: grpc 1.79.2 → 1.79.3 Security Bump

  • Analyze PR context and changed files
  • Review go.mod/go.sum changes
  • Assess security relevance and impact
  • Final verdict

Summary

This is a security patch for google.golang.org/grpc fixing CVE-adjacent issue #8981: an authorization bypass where malformed :path headers (missing leading slash) could bypass path-based "deny" rules in gRPC interceptors like grpc/authz. Requests with non-canonical paths are now immediately rejected with Unimplemented.

Review

Changes are correct and minimal. All 6 go.mod files consistently bump google.golang.org/grpc from v1.79.2v1.79.3, and all 6 go.sum files have corresponding hash updates with the correct new checksums:

google.golang.org/grpc v1.79.3 h1:sybAEdRIEtvcD68Gx7dmnwjZKlyfuc61Dyo9pGXXkKE=
google.golang.org/grpc v1.79.3/go.mod h1:KmT0Kjez+0dde/v2j9vzwoAScgEPx/Bw1CYChhHLrHQ=

Security relevance: grpc is an indirect dependency in all modules (pulled in transitively). The codebase does not appear to instantiate gRPC servers directly — it uses connectrpc.com/grpcreflect and grpc-gateway as intermediaries. However, given those frameworks sit atop the grpc server transport, the security fix still applies and upgrading is the right call.

No concerns — this is a pure, clean patch-version bump with no behavior changes outside the security fix. The compatibility score badge confirms no breakage.

Approved. Merge when ready.

@codecov
Copy link

codecov bot commented Mar 20, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 61.10%. Comparing base (3a710a9) to head (8bfcf10).
⚠️ Report is 1 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #3181      +/-   ##
==========================================
- Coverage   61.15%   61.10%   -0.05%     
==========================================
  Files         117      117              
  Lines       12082    12082              
==========================================
- Hits         7389     7383       -6     
- Misses       3867     3871       +4     
- Partials      826      828       +2     
Flag Coverage Δ
combined 61.10% <ø> (-0.05%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@julienrbrt julienrbrt added this pull request to the merge queue Mar 20, 2026
@github-merge-queue github-merge-queue bot removed this pull request from the merge queue due to failed status checks Mar 20, 2026
@julienrbrt julienrbrt merged commit c07e6f7 into main Mar 20, 2026
48 of 49 checks passed
@julienrbrt julienrbrt deleted the dependabot/go_modules/google.golang.org/grpc-1.79.3 branch March 20, 2026 15:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant