Bump google.golang.org/grpc from 1.69.2 to 1.79.3#1135
Conversation
Kusari Analysis Results:Caution Flagged Issues Detected Both analyses independently recommend blocking this PR. While the grpc upgrade from v1.69.2 to v1.79.3 correctly resolves CVE-2026-33186 (authorization bypass), it introduces or retains four unresolved HIGH-severity transitive dependency vulnerabilities that must be pinned in go.mod before merging: (1) CVE-2026-34986 in github.com/go-jose/go-jose/v4 v4.1.3 - unauthenticated remote DoS via panic on JWE decryption with empty encrypted_key; fixed at v4.1.4. (2) CVE-2026-29181 in go.opentelemetry.io/otel v1.39.0 - remote DoS via baggage header amplification; fixed at v1.43.0. (3) CVE-2026-24051 and CVE-2026-39883 in go.opentelemetry.io/otel/sdk v1.39.0 - PATH hijacking enabling arbitrary code execution on BSD/Solaris; fixed at v1.43.0. (4) CVE-2026-33814 in golang.org/x/net v0.48.0 - remote DoS via HTTP/2 infinite loop triggered by SETTINGS_MAX_FRAME_SIZE of 0; fixed at v0.54.0. All four are remotely exploitable with no authentication required (availability or integrity impact), making this a net negative security posture change if merged as-is. The static code scan returned zero findings, confirming no direct code issues, but does not negate the dependency risks. Required actions before merge: add explicit require directives in go.mod to pin github.com/go-jose/go-jose/v4 to v4.1.4, go.opentelemetry.io/otel and go.opentelemetry.io/otel/sdk to v1.43.0, and golang.org/x/net to v0.54.0, then run go mod tidy and re-validate. Note View full detailed analysis result for more information on the output and the checks that were run. Required Code MitigationsPin go.opentelemetry.io/otel and go.opentelemetry.io/otel/sdk to v1.43.0 or later to resolve CVE-2026-29181 (remote DoS via baggage header amplification) and CVE-2026-24051 / CVE-2026-39883 (PATH hijacking enabling arbitrary code execution on BSD/Solaris).
Pin github.com/go-jose/go-jose/v4 to v4.1.4 or later to resolve CVE-2026-34986 (unauthenticated remote DoS via panic on JWE decryption with empty encrypted_key).
Pin golang.org/x/net to v0.54.0 or later to resolve CVE-2026-33814 (remote DoS via HTTP/2 infinite loop triggered by SETTINGS_MAX_FRAME_SIZE of 0).
Required Dependency Mitigations
Found this helpful? Give it a 👍 or 👎 reaction! |
e3109b4 to
faa6047
Compare
|
Kusari PR Analysis rerun based on - faa6047 performed at: 2026-05-14T23:46:27Z - link to updated analysis |
faa6047 to
beb6a68
Compare
|
Kusari PR Analysis rerun based on - beb6a68 performed at: 2026-05-14T23:59:52Z - link to updated analysis |
Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.69.2 to 1.79.3. - [Release notes](https://github.com/grpc/grpc-go/releases) - [Commits](grpc/grpc-go@v1.69.2...v1.79.3) --- updated-dependencies: - dependency-name: google.golang.org/grpc dependency-version: 1.79.3 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
beb6a68 to
a7964c4
Compare
|
Kusari PR Analysis rerun based on - a7964c4 performed at: 2026-05-15T00:05:21Z - link to updated analysis |
Bumps google.golang.org/grpc from 1.69.2 to 1.79.3.
Release notes
Sourced from google.golang.org/grpc's releases.
... (truncated)
Commits
dda86dbChange version to 1.79.3 (#8983)72186f1grpc: enforce strict path checking for incoming requests on the server (#8981)97ca352Changing version to 1.79.3-dev (#8954)8902ab6Change the version to release 1.79.2 (#8947)a928670Cherry-pick #8874 to v1.79.x (#8904)06df363Change version to 1.79.2-dev (#8903)782f2deChange version to 1.79.1 (#8902)850eccbChange version to 1.79.1-dev (#8851)765ff05Change version to 1.79.0 (#8850)68804beCherry pick #8864 to v1.79.x (#8896)