Skip to content

Upgrade google.golang.org/grpc to v1.79.3 - Fix authorization bypass CVE#429

Merged
raghavendra-nataraj merged 1 commit intomainfrom
fix/upgrade-grpc-v1.79.3
Apr 20, 2026
Merged

Upgrade google.golang.org/grpc to v1.79.3 - Fix authorization bypass CVE#429
raghavendra-nataraj merged 1 commit intomainfrom
fix/upgrade-grpc-v1.79.3

Conversation

@raghavendra-nataraj
Copy link
Copy Markdown
Contributor

Summary

Upgrade gRPC-Go from v1.59.0 to v1.79.3 to fix authorization bypass vulnerability.

Vulnerability

HTTP/2 requests with non-canonical :path headers (missing leading slash) could bypass path-based authorization interceptors (grpc/authz). Fixed in gRPC v1.79.3 which rejects such requests with codes.Unimplemented.

Changes

  • google.golang.org/grpc: v1.59.0 → v1.79.3
  • golang.org/x/net replace: v0.17.0 → v0.48.0
  • golang.org/x/sys replace: pinned-2022 → v0.39.0

Verification

  • go mod tidy
  • go build ./...

CG Alert

https://dev.azure.com/msazure/msk8s/_componentGovernance/MocBuild/alert/14838135

Upgrade gRPC-Go from v1.59.0 to v1.79.3 to fix authorization bypass
vulnerability where HTTP/2 requests with non-canonical :path headers
(missing leading slash) could bypass path-based authorization interceptors.

Also updates replace directives for golang.org/x/net (v0.17.0 -> v0.48.0)
and golang.org/x/sys to compatible versions required by gRPC v1.79.3.

Addresses Component Governance alert:
https://dev.azure.com/msazure/msk8s/_componentGovernance/MocBuild/alert/14838135

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@raghavendra-nataraj
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants