Skip to content

chore: bump duty to v1.0.1237#21

Open
flankbot wants to merge 1 commit intomainfrom
bump-duty-auto-pr
Open

chore: bump duty to v1.0.1237#21
flankbot wants to merge 1 commit intomainfrom
bump-duty-auto-pr

Conversation

@flankbot
Copy link

@flankbot flankbot commented Mar 31, 2025

Automated changes by create-pull-request GitHub action

@flankbot flankbot added the dependencies Pull requests that update a dependency file label Mar 31, 2025
@flankbot flankbot changed the title chore: bump duty to v1.0.903 chore: bump duty to v1.0.904 Mar 31, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch 2 times, most recently from 8051f99 to 2ddb5df Compare March 31, 2025 15:06
@flankbot flankbot changed the title chore: bump duty to v1.0.904 chore: bump duty to v1.0.905 Mar 31, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 2ddb5df to 7231ce3 Compare April 1, 2025 06:14
@flankbot flankbot changed the title chore: bump duty to v1.0.905 chore: bump duty to v1.0.906 Apr 1, 2025
@flankbot flankbot changed the title chore: bump duty to v1.0.906 chore: bump duty to v1.0.907 Apr 3, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch 2 times, most recently from 7de41f7 to 9cbabd5 Compare April 3, 2025 06:20
@flankbot flankbot changed the title chore: bump duty to v1.0.907 chore: bump duty to v1.0.908 Apr 3, 2025
@flankbot flankbot changed the title chore: bump duty to v1.0.908 chore: bump duty to v1.0.909 Apr 4, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch 2 times, most recently from fad4f61 to 3d31763 Compare April 8, 2025 06:32
@flankbot flankbot changed the title chore: bump duty to v1.0.909 chore: bump duty to v1.0.910 Apr 8, 2025
@flankbot flankbot changed the title chore: bump duty to v1.0.910 chore: bump duty to v1.0.911 Apr 8, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 3d31763 to 9442604 Compare April 8, 2025 09:14
@flankbot flankbot changed the title chore: bump duty to v1.0.911 chore: bump duty to v1.0.912 Apr 9, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 9442604 to bb53ffe Compare April 9, 2025 05:56
@flankbot flankbot changed the title chore: bump duty to v1.0.912 chore: bump duty to v1.0.913 Apr 10, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from bb53ffe to 1903e6b Compare April 10, 2025 04:46
@flankbot flankbot changed the title chore: bump duty to v1.0.913 chore: bump duty to v1.0.914 Apr 11, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 1903e6b to 878bfba Compare April 11, 2025 06:36
@flankbot flankbot changed the title chore: bump duty to v1.0.914 chore: bump duty to v1.0.915 Apr 11, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 878bfba to da72b97 Compare April 11, 2025 08:48
@flankbot flankbot changed the title chore: bump duty to v1.0.915 chore: bump duty to v1.0.916 Apr 14, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from da72b97 to ce7aa20 Compare April 14, 2025 06:35
@flankbot flankbot changed the title chore: bump duty to v1.0.916 chore: bump duty to v1.0.917 Apr 15, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch 2 times, most recently from 3a8cf54 to 17da76d Compare April 15, 2025 09:00
@flankbot flankbot changed the title chore: bump duty to v1.0.926 chore: bump duty to v1.0.927 Apr 28, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 15e5f4b to f73aa79 Compare April 28, 2025 14:57
@flankbot flankbot changed the title chore: bump duty to v1.0.927 chore: bump duty to v1.0.928 Apr 28, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from f73aa79 to d8a2231 Compare April 28, 2025 15:01
@flankbot flankbot changed the title chore: bump duty to v1.0.928 chore: bump duty to v1.0.929 Apr 28, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from d8a2231 to 88b001a Compare April 28, 2025 15:05
@flankbot flankbot changed the title chore: bump duty to v1.0.929 chore: bump duty to v1.0.930 Apr 30, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 88b001a to 04bdc37 Compare April 30, 2025 14:21
@flankbot flankbot changed the title chore: bump duty to v1.0.930 chore: bump duty to v1.0.931 Apr 30, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 04bdc37 to d8e2182 Compare April 30, 2025 15:27
@flankbot flankbot changed the title chore: bump duty to v1.0.931 chore: bump duty to v1.0.932 May 2, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from d8e2182 to e3c112e Compare May 2, 2025 09:25
@flankbot flankbot changed the title chore: bump duty to v1.0.932 chore: bump duty to v1.0.933 May 5, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch 2 times, most recently from 1f78b21 to 8199d00 Compare May 6, 2025 08:45
@flankbot flankbot changed the title chore: bump duty to v1.0.933 chore: bump duty to v1.0.934 May 6, 2025
@flankbot flankbot changed the title chore: bump duty to v1.0.934 chore: bump duty to v1.0.935 May 13, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from 8199d00 to ec8381f Compare May 13, 2025 04:00
@flankbot flankbot changed the title chore: bump duty to v1.0.935 chore: bump duty to v1.0.936 May 13, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from ec8381f to c396aad Compare May 13, 2025 06:35
@flankbot flankbot changed the title chore: bump duty to v1.0.936 chore: bump duty to v1.0.937 May 13, 2025
@flankbot flankbot force-pushed the bump-duty-auto-pr branch from c396aad to cf89cef Compare May 13, 2025 07:16
@flankbot flankbot changed the title chore: bump duty to v1.0.937 chore: bump duty to v1.0.938 May 13, 2025
@coderabbitai
Copy link

coderabbitai bot commented Mar 18, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review

Walkthrough

Update to go.mod that bumps multiple direct and indirect module versions, adds and removes several transitive dependencies, and does not modify exported/public API declarations. (Dependency-only change.)

Changes

Cohort / File(s) Summary
Direct go.mod bumps
go.mod
Updated top-level require versions for several direct modules (e.g., github.com/flanksource/commons, github.com/flanksource/duty, github.com/go-logr/logr, github.com/jackc/pgx/v5, k8s.io/apimachinery, k8s.io/client-go, sigs.k8s.io/controller-runtime, github.com/samber/lo).
Indirect dependency churn (adds/updates/removals)
go.mod
Extensive changes to // indirect pins: many transitive modules upgraded (OpenTelemetry, Prometheus, gRPC/protobuf, github.com/jackc/*, golang.org/x/*, etc.), new indirect modules added (e.g., github.com/Masterminds/squirrel, github.com/charmbracelet/*, github.com/playwright-community/playwright-go, sigs.k8s.io/structured-merge-diff/v6, github.com/xuri/*), and older indirect entries removed or replaced.
API surface
go.mod
No changes to exported or public declarations; change is limited to module version pins in go.mod.
🚥 Pre-merge checks | ✅ 2 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Title check ⚠️ Warning The title mentions bumping duty to v1.0.1237, but the PR objectives indicate the actual version bumped is v1.0.1235, and the summary shows multiple dependencies were updated beyond just duty. Correct the title to reflect the actual version (v1.0.1235) or update it to better represent all dependency updates made in this changeset.
✅ Passed checks (2 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
📝 Generate docstrings
  • Create stacked PR
  • Commit on current branch
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch bump-duty-auto-pr
✨ Simplify code
  • Create PR with simplified code
  • Commit simplified code in branch bump-duty-auto-pr

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@go.mod`:
- Around line 12-14: The go.mod entry for sigs.k8s.io/controller-runtime
(currently v0.22.3) is incompatible with k8s.io/apimachinery and
k8s.io/client-go v0.35.2; update the controller-runtime version to v0.23.0 or
later in go.mod (sigs.k8s.io/controller-runtime v0.23.x) to match Kubernetes
v0.35.x, then run go mod tidy and run your unit/integration tests to ensure no
API breaks.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 593b00d3-2dfa-4f61-abcc-000a8d714359

📥 Commits

Reviewing files that changed from the base of the PR and between e8a3349 and bc4d4fd.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (1)
  • go.mod

Comment on lines +12 to +14
k8s.io/apimachinery v0.35.2
k8s.io/client-go v0.35.2
sigs.k8s.io/controller-runtime v0.22.3
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

🌐 Web query:

Is controller-runtime v0.22.3 compatible with k8s.io/client-go v0.35.2 and k8s.io/apimachinery v0.35.2?

💡 Result:

No, controller-runtime v0.22.3 is not compatible with k8s.io/client-go v0.35.2 and k8s.io/apimachinery v0.35.2. controller-runtime v0.22.x is tested and compatible only with k8s.io/client-go v0.34.x and k8s.io/apimachinery v0.34.x, as stated in the official compatibility matrix in the project's README and VERSIONING.md. Compatibility with other versions is unsupported and not tested. v0.35.x corresponds to Kubernetes 1.35, while v0.34.x aligns with Kubernetes 1.34. Use controller-runtime v0.23.x or later for v0.35.x support.

Citations:


🏁 Script executed:

#!/bin/bash
# Description: Check controller-runtime's go.mod to see what k8s versions it requires

echo "Fetching controller-runtime v0.22.3 dependencies..."
curl -s "https://raw.githubusercontent.com/kubernetes-sigs/controller-runtime/v0.22.3/go.mod" | \
  grep -E "k8s.io/(client-go|apimachinery|api)" || echo "Unable to fetch go.mod"

Repository: flanksource/kopper

Length of output: 331


Upgrade controller-runtime to v0.23.x or later for compatibility with k8s.io packages v0.35.2.

controller-runtime v0.22.3 requires k8s.io/client-go and k8s.io/apimachinery v0.34.x, but your go.mod specifies v0.35.2. This version mismatch will cause runtime incompatibilities. Upgrade to controller-runtime v0.23.x or later to support Kubernetes v0.35.x packages.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` around lines 12 - 14, The go.mod entry for
sigs.k8s.io/controller-runtime (currently v0.22.3) is incompatible with
k8s.io/apimachinery and k8s.io/client-go v0.35.2; update the controller-runtime
version to v0.23.0 or later in go.mod (sigs.k8s.io/controller-runtime v0.23.x)
to match Kubernetes v0.35.x, then run go mod tidy and run your unit/integration
tests to ensure no API breaks.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@go.mod`:
- Line 102: The dependency on github.com/jackc/pgproto3/v2 v2.3.3 is vulnerable
(CVE-2026-4427); remove references to github.com/jackc/pgproto3/v2 in go.mod and
migrate your DB client code to use github.com/jackc/pgx/v5 (import path
github.com/jackc/pgx/v5) which integrates pgproto3 differently and is not
affected; update any code that directly imports pgproto3 (search for imports of
"github.com/jackc/pgproto3/v2" and usages) to use the equivalent pgx/v5 APIs
(e.g., replace direct pgproto3 decoding/connection logic with pgx.Conn or
pgxpool and their Read/Write helpers), run go mod tidy and tests, and if
immediate migration is not possible add a temporary mitigation such as
validating DataRow lengths at the connection boundary via a wrapper around reads
until full migration is complete.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: d1953ef0-6228-4a1f-a1cc-e54a9ac77803

📥 Commits

Reviewing files that changed from the base of the PR and between bc4d4fd and b381f9e.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (1)
  • go.mod

github.com/jackc/pgservicefile v0.0.0-20231201235250-de7065d80cb9 // indirect
github.com/jackc/pgtype v1.14.0 // indirect
github.com/jackc/pgx/v4 v4.18.1 // indirect
github.com/jackc/pgproto3/v2 v2.3.3 // indirect
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

❓ Verification inconclusive

Script executed:

#!/bin/bash
# Check for security advisories and patched versions for pgproto3

echo "=== Checking pgproto3 security advisories ==="
gh api graphql -f query='
{
  securityVulnerabilities(first: 10, ecosystem: GO, package: "github.com/jackc/pgproto3/v2") {
    nodes {
      advisory {
        summary
        severity
        ghsaId
        publishedAt
      }
      vulnerableVersionRange
      firstPatchedVersion {
        identifier
      }
    }
  }
}'

echo ""
echo "=== Checking latest version of pgproto3/v2 ==="
curl -s "https://proxy.golang.org/github.com/jackc/pgproto3/v2/@latest" | jq -r '.Version'

Repository: flanksource/kopper


Repository: flanksource/kopper
Exit code: 0

stdout:

=== Checking pgproto3 security advisories ===
{
  "message": "Bad credentials",
  "documentation_url": "https://docs.github.com/rest",
  "status": "401"
}
=== Checking latest version of pgproto3/v2 ===
v2.3.3

stderr:

gh: Bad credentials (HTTP 401)

GHSA-jqcq-xjh3-6g23 pgproto3 vulnerability


GHSA-jqcq-xjh3-6g23 is a Denial of Service (DoS) vulnerability in the github.com/jackc/pgproto3/v2 Go library, which implements the PostgreSQL wire protocol version 3. The issue is in the DataRow.Decode function, which fails to properly validate field lengths. A malicious or compromised PostgreSQL server can send a DataRow message with oversized field lengths, causing excessive memory allocation or crashes in client applications using pgproto3/v2. It is also tracked as CVE-2026-4427, as noted in Red Hat Bugzilla. The advisory was published around March 19, 2026, making it a very recent vulnerability (today is 2026-03-20). Affected package: github.com/jackc/pgproto3/v2 (pure protocol library, used by higher-level drivers like pgx v4). Impact: Clients connecting to untrusted PostgreSQL servers are vulnerable to DoS by a malicious server sending crafted DataRow messages. No patch version or remediation details are available in current sources; check the GitHub advisory for updates. Mitigation: Avoid connecting to untrusted PostgreSQL servers, or use higher-level libraries that may have additional validation (e.g., pgx v5 integrates pgproto3 differently). This is distinct from the earlier GHSA-7jwh-3vrq-q3m8 (CVE-2024-27304), which was an SQL injection via integer overflow in message sizing, fixed in pgproto3/v2 2.3.3.

Citations:


GHSA-x6gf-mpr2-68h6 pgproto3 negative field length


GHSA-x6gf-mpr2-68h6 is a GitHub Security Advisory ID referencing a potential vulnerability in github.com/jackc/pgproto3/v2, as noted in Go's vulndb tracking (result 1 and 5). It appears related to a recent denial-of-service (DoS) issue in pgproto3/v2 where a negative field length in DataRow.Decode causes a panic due to slice bounds out of range (CVE-2026-4427, results 10,12,13). A malicious or compromised PostgreSQL server can send a crafted DataRow message with negative int32 field length (uint32 0x80000000–0xFFFFFFFE), bypassing bounds checks since len >= 0 always passes when msgSize < 0, leading to panic at src[rp : rp+msgSize : rp+msgSize]. Severity: CVSS 7.5 High (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Affected: github.com/jackc/pgproto3 v2.3.3 (EOL July 1, 2025; result 19). pgx v5 pgproto3 not vulnerable (result 10). Fix: Add msgSize < 0 check before bounds check. Golang/vulndb is tracking for inclusion (results 1,5,7). No official GHSA page found for this ID; may be internal/proposed ID.

Citations:


github.com/jackc/pgproto3/v2 security advisories patched version


The primary security advisory for github.com/jackc/pgproto3/v2 (used with pgx v4) is GHSA-7jwh-3vrq-q3m8 (CVE-2024-27304), a SQL injection vulnerability due to integer overflow in protocol message size calculation, allowing a single large message to be interpreted as multiple unauthorized messages. Affected versions are before v2.3.3. Patched in v2.3.3 via commit 945c2126f6db8f3bea7eeebe307c01fe92bca007. An older DoS vulnerability (unbounded StartupMessage length) was patched in v2.1.1. A recent vulnerability (CVE-2026-4427, March 2026), improper input validation in DataRow.Decode causing panic from negative field length (from malicious/compromised PG server), affects >=v2.0.0 with no fixed version listed (Snyk). The repository was archived July 2025, with only security fixes promised until EOL July 1, 2025; no patch found as of 2026-03-20. Recommendation: Upgrade to v2.3.3+ for known patched issues (CVE-2024-27304). For pgx v5+, pgproto3 is integrated (patched in v5.5.4). Monitor for CVE-2026-4427 patch or migrate from archived repo.

Citations:


HIGH severity vulnerability in github.com/jackc/pgproto3/v2 v2.3.3 with no available patch.

The dependency is affected by CVE-2026-4427, a denial of service vulnerability in the DataRow.Decode function that fails to validate field lengths. A malicious or compromised PostgreSQL server can send crafted messages with invalid field lengths, causing panics or excessive memory allocation in client applications. Severity: CVSS 7.5 High.

The pgproto3/v2 repository was archived in July 2025 with end-of-life July 1, 2025, and no patched version is currently available for this March 2026 vulnerability. Consider migrating to pgx v5, which integrates pgproto3 differently and is not affected.

🧰 Tools
🪛 OSV Scanner (2.3.3)

[HIGH] 102-102: github.com/jackc/pgproto3/v2 2.3.3: Denial of service in github.com/jackc/pgproto3/v2

(GHSA-jqcq-xjh3-6g23)


[HIGH] 102-102: github.com/jackc/pgproto3/v2 2.3.3: pgproto3: Negative field length panics in DataRow.Decode

(GHSA-x6gf-mpr2-68h6)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` at line 102, The dependency on github.com/jackc/pgproto3/v2 v2.3.3 is
vulnerable (CVE-2026-4427); remove references to github.com/jackc/pgproto3/v2 in
go.mod and migrate your DB client code to use github.com/jackc/pgx/v5 (import
path github.com/jackc/pgx/v5) which integrates pgproto3 differently and is not
affected; update any code that directly imports pgproto3 (search for imports of
"github.com/jackc/pgproto3/v2" and usages) to use the equivalent pgx/v5 APIs
(e.g., replace direct pgproto3 decoding/connection logic with pgx.Conn or
pgxpool and their Read/Write helpers), run go mod tidy and tests, and if
immediate migration is not possible add a temporary mitigation such as
validating DataRow lengths at the connection boundary via a wrapper around reads
until full migration is complete.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@go.mod`:
- Line 208: Update the grpc dependency in go.mod from google.golang.org/grpc
v1.78.0 to v1.79.3 (or later) to address CVE-2026-33186; after changing the
version string for the module reference "google.golang.org/grpc" run dependency
resolution (e.g., go get google.golang.org/grpc@v1.79.3 and go mod tidy) and
rebuild/test to ensure no breakages from the grpc upgrade.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 37e551b7-0414-48b5-9ff3-2e41af65ad92

📥 Commits

Reviewing files that changed from the base of the PR and between b381f9e and 7ec93d0.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (1)
  • go.mod

gomodules.xyz/jsonpatch/v2 v2.5.0 // indirect
google.golang.org/genproto/googleapis/api v0.0.0-20260226221140-a57be14db171 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20260226221140-a57be14db171 // indirect
google.golang.org/grpc v1.78.0 // indirect
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

🌐 Web query:

What is GHSA-p77j-4mvh-x3m3 vulnerability in google.golang.org/grpc and which versions are affected and patched?

💡 Result:

GHSA-p77j-4mvh-x3m3 is a critical authorization bypass vulnerability (CVE-2026-33186, CVSS 9.1) in google.golang.org/grpc (gRPC-Go). It stems from improper input validation of the HTTP/2 :path pseudo-header. The server accepts requests missing the leading slash (e.g., "Service/Method" instead of "/Service/Method"), routes them correctly, but authorization interceptors see the raw non-canonical path. This causes "deny" rules for canonical paths to fail matching, allowing bypass if there's a fallback "allow" rule. Affected: All versions before 1.79.3. Impacts gRPC-Go servers using path-based authorization (e.g., grpc/authz) with specific deny rules for canonical paths and fallback allow. Patched: Upgrade to v1.79.3 or later (also latest master branch). The fix rejects invalid :path immediately with codes.Unimplemented. Workaround: Custom unary interceptor to reject if info.FullMethod lacks leading '/'. Published: 2026-03-18.

Citations:


Upgrade google.golang.org/grpc to v1.79.3 or later to patch critical authorization bypass vulnerability.

google.golang.org/grpc v1.78.0 contains GHSA-p77j-4mvh-x3m3 (CVE-2026-33186, CVSS 9.1), a critical authorization bypass vulnerability. The issue stems from improper validation of the HTTP/2 :path pseudo-header, allowing servers to route requests with non-canonical paths while authorization interceptors fail to match deny rules, potentially enabling bypass if a fallback allow rule exists. Upgrade to v1.79.3 or later.

🧰 Tools
🪛 OSV Scanner (2.3.3)

[CRITICAL] 208-208: google.golang.org/grpc 1.78.0: gRPC-Go has an authorization bypass via missing leading slash in :path

(GHSA-p77j-4mvh-x3m3)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` at line 208, Update the grpc dependency in go.mod from
google.golang.org/grpc v1.78.0 to v1.79.3 (or later) to address CVE-2026-33186;
after changing the version string for the module reference
"google.golang.org/grpc" run dependency resolution (e.g., go get
google.golang.org/grpc@v1.79.3 and go mod tidy) and rebuild/test to ensure no
breakages from the grpc upgrade.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

♻️ Duplicate comments (3)
go.mod (3)

12-14: ⚠️ Potential issue | 🔴 Critical

Controller-runtime and Kubernetes module versions appear out of compatibility matrix.

controller-runtime v0.22.3 with k8s.io/apimachinery/client-go v0.35.2 is likely unsupported and can cause reconcile/runtime breakage. Please align controller-runtime to the matching minor for k8s.io v0.35.x.

Is sigs.k8s.io/controller-runtime v0.22.3 officially compatible with k8s.io/client-go and k8s.io/apimachinery v0.35.2? Please cite the controller-runtime compatibility matrix (README or VERSIONING.md).
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` around lines 12 - 14, The go.mod currently mixes k8s.io/apimachinery
and k8s.io/client-go at v0.35.2 with sigs.k8s.io/controller-runtime v0.22.3
which is outside the controller-runtime/k8s compatibility matrix; update the
sigs.k8s.io/controller-runtime version to the controller-runtime minor that
officially supports k8s v0.35.x (align the controller-runtime version with
k8s.io v0.35.x), then run `go mod tidy` and verify builds/tests; reference the
compatibility matrix in controller-runtime's README/VERSIONING.md when choosing
the exact controller-runtime version and mention the change in the PR
description.

208-208: ⚠️ Potential issue | 🔴 Critical

Upgrade grpc-go from v1.78.0 to a patched release immediately.

google.golang.org/grpc v1.78.0 is affected by a critical authorization-bypass advisory; bump to the first patched release (or newer) to eliminate the risk.

For GHSA-p77j-4mvh-x3m3 in google.golang.org/grpc, what is the first patched version and are there any required migration notes when upgrading from v1.78.0?
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` at line 208, The go.mod entry pins google.golang.org/grpc to v1.78.0
which is vulnerable; bump the module to the first patched release
(google.golang.org/grpc v1.78.1) or later, update the dependency with go
commands (e.g., go get google.golang.org/grpc@v1.78.1 && go mod tidy), and run
the test suite/linters to verify nothing broke; there are no special migration
code changes required when moving from v1.78.0 to v1.78.1.

102-102: ⚠️ Potential issue | 🟠 Major

Known high-severity DoS vulnerability still present via pgproto3/v2.

github.com/jackc/pgproto3/v2 v2.3.3 is flagged by current advisories; this should be removed from the graph by upgrading the upstream module(s) that pull it in (or migrating fully to dependency paths that avoid it).

What is the current status of GO-2026-4518 / GHSA-jqcq-xjh3-6g23 / GHSA-x6gf-mpr2-68h6 for github.com/jackc/pgproto3/v2, and what fixed or recommended replacement versions are available?
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` at line 102, The go.mod entry for github.com/jackc/pgproto3/v2 v2.3.3
is a known high-severity DoS risk; find which modules in your graph depend on it
(use go mod graph or go mod why to trace paths to github.com/jackc/pgproto3/v2)
and upgrade those upstream modules (or replace the direct dependency) to
versions that vendor or require a non-vulnerable pgproto3 release, then run go
get to bump the dependency (or go get
github.com/jackc/pgproto3/v2@<fixed-version> if you can pin directly) and run go
mod tidy and go list -m all to verify v2.3.3 is removed; ensure the final go.mod
no longer references github.com/jackc/pgproto3/v2 v2.3.3 and update any
consumers (e.g., modules importing pgx/pgx/v4 or other drivers that pulled it)
to their fixed releases.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Duplicate comments:
In `@go.mod`:
- Around line 12-14: The go.mod currently mixes k8s.io/apimachinery and
k8s.io/client-go at v0.35.2 with sigs.k8s.io/controller-runtime v0.22.3 which is
outside the controller-runtime/k8s compatibility matrix; update the
sigs.k8s.io/controller-runtime version to the controller-runtime minor that
officially supports k8s v0.35.x (align the controller-runtime version with
k8s.io v0.35.x), then run `go mod tidy` and verify builds/tests; reference the
compatibility matrix in controller-runtime's README/VERSIONING.md when choosing
the exact controller-runtime version and mention the change in the PR
description.
- Line 208: The go.mod entry pins google.golang.org/grpc to v1.78.0 which is
vulnerable; bump the module to the first patched release (google.golang.org/grpc
v1.78.1) or later, update the dependency with go commands (e.g., go get
google.golang.org/grpc@v1.78.1 && go mod tidy), and run the test suite/linters
to verify nothing broke; there are no special migration code changes required
when moving from v1.78.0 to v1.78.1.
- Line 102: The go.mod entry for github.com/jackc/pgproto3/v2 v2.3.3 is a known
high-severity DoS risk; find which modules in your graph depend on it (use go
mod graph or go mod why to trace paths to github.com/jackc/pgproto3/v2) and
upgrade those upstream modules (or replace the direct dependency) to versions
that vendor or require a non-vulnerable pgproto3 release, then run go get to
bump the dependency (or go get github.com/jackc/pgproto3/v2@<fixed-version> if
you can pin directly) and run go mod tidy and go list -m all to verify v2.3.3 is
removed; ensure the final go.mod no longer references
github.com/jackc/pgproto3/v2 v2.3.3 and update any consumers (e.g., modules
importing pgx/pgx/v4 or other drivers that pulled it) to their fixed releases.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 9d75bd00-15a5-41ff-8fca-8d0c15a77fc4

📥 Commits

Reviewing files that changed from the base of the PR and between 7ec93d0 and 73cd97f.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (1)
  • go.mod

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

♻️ Duplicate comments (3)
go.mod (3)

208-208: ⚠️ Potential issue | 🔴 Critical

google.golang.org/grpc v1.78.0 is below the patched version for a critical auth bypass.

At Line 208, upgrade to v1.79.3 or newer for GHSA-p77j-4mvh-x3m3 (CVE-2026-33186).

Suggested change
-	google.golang.org/grpc v1.78.0 // indirect
+	google.golang.org/grpc v1.79.3 // indirect

Reference: GHSA-p77j-4mvh-x3m3

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` at line 208, Update the grpc dependency line for module
google.golang.org/grpc in go.mod from v1.78.0 to v1.79.3 (or any later patch >=
v1.79.3) to address the CVE; locate the entry with "google.golang.org/grpc
v1.78.0 // indirect" and change the version token to v1.79.3, then run `go mod
tidy`/`go get google.golang.org/grpc@v1.79.3` to refresh go.sum and ensure the
new version is used.

12-14: ⚠️ Potential issue | 🔴 Critical

controller-runtime is mismatched with k8s.io/* minor version.

At Line 14, sigs.k8s.io/controller-runtime v0.22.3 is paired with k8s.io/apimachinery/client-go v0.35.2 (Lines 12-13). controller-runtime’s compatibility table maps v0.22 to k8s v0.34, so this combo is unsupported and risky.

Suggested change
-	sigs.k8s.io/controller-runtime v0.22.3
+	sigs.k8s.io/controller-runtime v0.23.3

Reference: https://github.com/kubernetes-sigs/controller-runtime#compatibility

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@go.mod` around lines 12 - 14, The controller-runtime version is incompatible
with the k8s.io/* minor version; update the go.mod entry for
sigs.k8s.io/controller-runtime to a release that is compatible with k8s v0.35
(e.g., switch sigs.k8s.io/controller-runtime v0.22.3 to a v0.23.x release that
supports k8s v0.35) so it aligns with k8s.io/apimachinery and k8s.io/client-go
v0.35.2; ensure you run `go get`/`go mod tidy` afterwards to lock dependencies
and verify compatibility.

102-102: ⚠️ Potential issue | 🟠 Major

pgproto3/v2 v2.3.3 is still on a known high-severity DoS advisory with no patch.

At Line 102, this version is in affected ranges for GHSA-jqcq-xjh3-6g23 / GHSA-x6gf-mpr2-68h6, and patched version is currently listed as “None.” Please treat this as an unresolved risk and prefer eliminating direct/indirect exposure (e.g., via dependency upgrade path to unaffected stack).

References:

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Duplicate comments:
In `@go.mod`:
- Line 208: Update the grpc dependency line for module google.golang.org/grpc in
go.mod from v1.78.0 to v1.79.3 (or any later patch >= v1.79.3) to address the
CVE; locate the entry with "google.golang.org/grpc v1.78.0 // indirect" and
change the version token to v1.79.3, then run `go mod tidy`/`go get
google.golang.org/grpc@v1.79.3` to refresh go.sum and ensure the new version is
used.
- Around line 12-14: The controller-runtime version is incompatible with the
k8s.io/* minor version; update the go.mod entry for
sigs.k8s.io/controller-runtime to a release that is compatible with k8s v0.35
(e.g., switch sigs.k8s.io/controller-runtime v0.22.3 to a v0.23.x release that
supports k8s v0.35) so it aligns with k8s.io/apimachinery and k8s.io/client-go
v0.35.2; ensure you run `go get`/`go mod tidy` afterwards to lock dependencies
and verify compatibility.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 13f60808-ad3b-4d20-9e38-8004a9d392d6

📥 Commits

Reviewing files that changed from the base of the PR and between 73cd97f and 62d45d3.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (1)
  • go.mod

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file ready

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants