Skip to content

*: bump thanos-community/grpc-go to fix CVE-2026-33186#8744

Merged
saswatamcode merged 1 commit intothanos-io:mainfrom
danielmellado:bump-grpc-go-cve-2026-33186
Mar 31, 2026
Merged

*: bump thanos-community/grpc-go to fix CVE-2026-33186#8744
saswatamcode merged 1 commit intothanos-io:mainfrom
danielmellado:bump-grpc-go-cve-2026-33186

Conversation

@danielmellado
Copy link
Copy Markdown
Contributor

  • I added CHANGELOG entry for this change.
  • Change is not relevant to the end user.

Changes

Bump the thanos-community/grpc-go fork to pick up the cherry-picked fix for
CVE-2026-33186 (CVSS 9.1) from thanos-community/grpc-go#1.
This enforces strict path checking for incoming requests on the server,
rejecting any request with a non-canonical :path header (missing the leading
slash) with an Unimplemented error. Without this fix, malformed paths could
bypass path-based restricted "deny" rules in interceptors like grpc/authz.

Verification

Dependency-only change (go.mod / go.sum). The fix itself is tested upstream
in grpc/grpc-go#8985.

@danielmellado danielmellado force-pushed the bump-grpc-go-cve-2026-33186 branch from a9181aa to c046408 Compare March 31, 2026 09:49
Bump the grpc-go fork to pick up the cherry-picked fix for
CVE-2026-33186 (CVSS 9.1), which enforces strict path checking
for incoming requests on the server, preventing authorization
bypass via malformed :path headers.

Signed-off-by: Daniel Mellado <dmellado@fedoraproject.org>
@danielmellado danielmellado force-pushed the bump-grpc-go-cve-2026-33186 branch from c046408 to 06e6807 Compare March 31, 2026 09:50
@danielmellado
Copy link
Copy Markdown
Contributor Author

doc CI failures are unrelated to the PR

@saswatamcode saswatamcode merged commit 0210859 into thanos-io:main Mar 31, 2026
43 of 48 checks passed
danielmellado added a commit to danielmellado/thanos that referenced this pull request Mar 31, 2026
Bump the grpc-go fork to pick up the cherry-picked fix for
CVE-2026-33186 (CVSS 9.1), which enforces strict path checking
for incoming requests on the server, preventing authorization
bypass via malformed :path headers.

Signed-off-by: Daniel Mellado <dmellado@fedoraproject.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants