Bump google.golang.org/grpc from 1.69.4 to 1.79.3 in /function/loader#1131
Conversation
Kusari Analysis Results:Caution Flagged Issues Detected Both independent analyses unanimously recommend blocking this PR. While the grpc upgrade from v1.69.4 to v1.79.3 is beneficial in resolving CVE-2026-33186 (authorization bypass), it introduces or exposes two unresolved HIGH-severity, unauthenticated remote DoS vulnerabilities in transitive dependencies: (1) CVE-2026-29181 in go.opentelemetry.io/otel v1.39.0 - multi-value baggage header amplification enabling CPU and memory exhaustion by any unauthenticated remote attacker (CVSS AV:N/AC:L/PR:N/UI:N/A:H); and (2) CVE-2026-33814 in golang.org/x/net v0.48.0 - HTTP/2 infinite loop DoS when SETTINGS_MAX_FRAME_SIZE is 0 (CVSS AV:N/AC:L/PR:N/UI:N/A:H). Both vulnerabilities are network-exploitable with no authentication required, posing direct availability risk to production services. No code-level issues were identified, but the dependency vulnerabilities are blocking. Required actions before re-review: (1) In function/loader/go.mod, explicitly pin go.opentelemetry.io/otel to v1.43.0 or later and also update related sub-modules (otel/metric, otel/trace) for version consistency. (2) In function/loader/go.mod, explicitly pin golang.org/x/net to v0.54.0 or later. (3) Run go mod tidy in the function/loader directory. (4) Re-run govulncheck to confirm both CVEs are resolved before re-submitting. Note View full detailed analysis result for more information on the output and the checks that were run. Required Code MitigationsPin go.opentelemetry.io/otel to v1.43.0 or later to resolve CVE-2026-29181. Run: go get go.opentelemetry.io/otel@v1.43.0 and go mod tidy in the function/loader directory, then add or update the explicit require directive.
Pin golang.org/x/net to v0.54.0 or later to resolve CVE-2026-33814. Run: go get golang.org/x/net@v0.54.0 and go mod tidy in the function/loader directory, then add or update the explicit require directive.
Required Dependency Mitigations
Summary: Multi-value baggage header extraction parses each header field-value independently and aggregates members, allowing an unauthenticated remote attacker to amplify CPU and memory allocations by sending many baggage header lines, causing high per-request latency and resource exhaustion (remote DoS). CVSS: AV:N/AC:L/PR:N/UI:N/A:H. Dependency path: github.com/ossf/package-analysis/loader → cloud.google.com/go/bigquery → cloud.google.com/go → go.opentelemetry.io/otel This is a transitive dependency. Fix by explicitly pinning go.opentelemetry.io/otel to v1.43.0 in function/loader/go.mod. Run in the function/loader directory: Then add or update the explicit require directive in function/loader/go.mod: Also verify that the related sub-modules (go.opentelemetry.io/otel/metric, go.opentelemetry.io/otel/trace) are correspondingly updated to v1.43.0 to maintain version consistency.
Found this helpful? Give it a 👍 or 👎 reaction! |
c7daa76 to
0d57863
Compare
|
Kusari PR Analysis rerun based on - 0d57863 performed at: 2026-05-14T23:45:38Z - link to updated analysis |
|
@dependabot rebase |
0d57863 to
7e2051f
Compare
|
Kusari PR Analysis rerun based on - 7e2051f performed at: 2026-05-15T00:09:10Z - link to updated analysis |
|
@dependabot rebase |
Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.69.4 to 1.79.3. - [Release notes](https://github.com/grpc/grpc-go/releases) - [Commits](grpc/grpc-go@v1.69.4...v1.79.3) --- updated-dependencies: - dependency-name: google.golang.org/grpc dependency-version: 1.79.3 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
7e2051f to
f31116c
Compare
|
Kusari PR Analysis rerun based on - f31116c performed at: 2026-05-15T00:23:15Z - link to updated analysis |
|
Kusari PR Analysis rerun based on - f31116c performed at: 2026-05-15T00:38:44Z - link to updated analysis |
|
Kusari PR Analysis rerun based on - f31116c performed at: 2026-05-15T01:02:32Z - link to updated analysis |
|
Kusari PR Analysis rerun based on - f31116c performed at: 2026-05-15T01:17:00Z - link to updated analysis |
|
Kusari PR Analysis rerun based on - f31116c performed at: 2026-05-15T02:02:28Z - link to updated analysis |
Bumps google.golang.org/grpc from 1.69.4 to 1.79.3.
Release notes
Sourced from google.golang.org/grpc's releases.
... (truncated)
Commits
dda86dbChange version to 1.79.3 (#8983)72186f1grpc: enforce strict path checking for incoming requests on the server (#8981)97ca352Changing version to 1.79.3-dev (#8954)8902ab6Change the version to release 1.79.2 (#8947)a928670Cherry-pick #8874 to v1.79.x (#8904)06df363Change version to 1.79.2-dev (#8903)782f2deChange version to 1.79.1 (#8902)850eccbChange version to 1.79.1-dev (#8851)765ff05Change version to 1.79.0 (#8850)68804beCherry pick #8864 to v1.79.x (#8896)