-
Notifications
You must be signed in to change notification settings - Fork 65
[release-4.12] OCPBUGS-79754: Bump google.golang.org/grpc to v1.79.3 #533
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release-4.12
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -10,7 +10,7 @@ require ( | |
| github.com/containers/storage v1.42.0 | ||
| github.com/docker/distribution v2.8.1+incompatible | ||
| github.com/fsouza/go-dockerclient v1.7.11 | ||
| github.com/go-logr/logr v1.2.3 // indirect | ||
| github.com/go-logr/logr v1.4.1 // indirect | ||
| github.com/google/gofuzz v1.2.0 // indirect | ||
| github.com/opencontainers/runc v1.1.12 | ||
| github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417 | ||
|
|
@@ -24,7 +24,7 @@ require ( | |
| github.com/spf13/cobra v1.5.0 | ||
| github.com/spf13/pflag v1.0.5 | ||
| github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 | ||
| golang.org/x/sys v0.13.0 | ||
| golang.org/x/sys v0.21.0 | ||
| k8s.io/api v0.25.2 | ||
| k8s.io/apimachinery v0.25.2 | ||
| k8s.io/client-go v0.25.2 | ||
|
|
@@ -45,9 +45,9 @@ require ( | |
| github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d // indirect | ||
| github.com/beorn7/perks v1.0.1 // indirect | ||
| github.com/blang/semver v3.5.1+incompatible // indirect | ||
| github.com/cespare/xxhash/v2 v2.1.2 // indirect | ||
| github.com/cespare/xxhash/v2 v2.2.0 // indirect | ||
| github.com/chai2010/gettext-go v1.0.2 // indirect | ||
| github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e // indirect | ||
| github.com/chzyer/readline v1.5.0 // indirect | ||
| github.com/containerd/cgroups v1.0.3 // indirect | ||
| github.com/containerd/containerd v1.6.6 // indirect | ||
| github.com/containerd/continuity v0.2.2 // indirect | ||
|
|
@@ -78,12 +78,12 @@ require ( | |
| github.com/godbus/dbus/v5 v5.1.0 // indirect | ||
| github.com/gogo/protobuf v1.3.2 // indirect | ||
| github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect | ||
| github.com/golang/protobuf v1.5.2 // indirect | ||
| github.com/golang/protobuf v1.5.4 // indirect | ||
| github.com/google/btree v1.0.1 // indirect | ||
| github.com/google/go-cmp v0.5.8 // indirect | ||
| github.com/google/go-cmp v0.6.0 // indirect | ||
| github.com/google/go-intervals v0.0.2 // indirect | ||
| github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect | ||
| github.com/google/uuid v1.3.0 // indirect | ||
| github.com/google/uuid v1.6.0 // indirect | ||
| github.com/gorilla/mux v1.8.0 // indirect | ||
| github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 // indirect | ||
| github.com/hashicorp/errwrap v1.1.0 // indirect | ||
|
|
@@ -95,7 +95,7 @@ require ( | |
| github.com/jinzhu/copier v0.3.5 // indirect | ||
| github.com/josharian/intern v1.0.0 // indirect | ||
| github.com/json-iterator/go v1.1.12 // indirect | ||
| github.com/klauspost/compress v1.15.9 // indirect | ||
| github.com/klauspost/compress v1.16.7 // indirect | ||
| github.com/klauspost/pgzip v1.2.5 // indirect | ||
| github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de // indirect | ||
| github.com/magiconair/properties v1.8.5 // indirect | ||
|
|
@@ -128,19 +128,19 @@ require ( | |
| github.com/pmezard/go-difflib v1.0.0 // indirect | ||
| github.com/proglottis/gpgme v0.1.3 // indirect | ||
| github.com/prometheus/client_golang v1.12.1 // indirect | ||
| github.com/prometheus/client_model v0.2.0 // indirect | ||
| github.com/prometheus/client_model v0.5.0 // indirect | ||
| github.com/prometheus/common v0.32.1 // indirect | ||
| github.com/prometheus/procfs v0.7.3 // indirect | ||
| github.com/rivo/uniseg v0.2.0 // indirect | ||
| github.com/russross/blackfriday v1.6.0 // indirect | ||
| github.com/seccomp/libseccomp-golang v0.10.0 // indirect | ||
| github.com/sirupsen/logrus v1.9.0 // indirect | ||
| github.com/spf13/afero v1.6.0 // indirect | ||
| github.com/spf13/afero v1.10.0 // indirect | ||
| github.com/spf13/cast v1.4.1 // indirect | ||
| github.com/spf13/jwalterweatherman v1.1.0 // indirect | ||
| github.com/spf13/viper v1.10.0 // indirect | ||
| github.com/stefanberger/go-pkcs11uri v0.0.0-20201008174630-78d3cae3a980 // indirect | ||
| github.com/stretchr/testify v1.8.0 | ||
| github.com/stretchr/testify v1.8.4 | ||
| github.com/subosito/gotenv v1.2.0 // indirect | ||
| github.com/sylabs/sif/v2 v2.7.1 // indirect | ||
| github.com/tchap/go-patricia v2.3.0+incompatible // indirect | ||
|
|
@@ -155,20 +155,19 @@ require ( | |
| github.com/xlab/treeprint v1.1.0 // indirect | ||
| go.etcd.io/bbolt v1.3.6 // indirect | ||
| go.mozilla.org/pkcs7 v0.0.0-20200128120323-432b2356ecb1 // indirect | ||
| go.opencensus.io v0.23.0 // indirect | ||
| go.opencensus.io v0.24.0 // indirect | ||
| go.starlark.net v0.0.0-20200306205701-8dd3e2ee1dd5 // indirect | ||
| golang.org/x/crypto v0.14.0 // indirect | ||
| golang.org/x/mod v0.8.0 // indirect | ||
| golang.org/x/net v0.8.0 // indirect | ||
| golang.org/x/oauth2 v0.0.0-20220622183110-fd043fe589d2 // indirect | ||
| golang.org/x/sync v0.1.0 // indirect | ||
| golang.org/x/crypto v0.19.0 // indirect | ||
| golang.org/x/mod v0.17.0 // indirect | ||
| golang.org/x/net v0.26.0 // indirect | ||
| golang.org/x/oauth2 v0.18.0 // indirect | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🧩 Analysis chain🏁 Script executed: #!/bin/bash
# Check latest oauth2 version
curl -s https://proxy.golang.org/golang.org/x/oauth2/@v/list | tail -5
# Check what requires oauth2
echo -e "\n=== Dependencies requiring oauth2 ==="
rg "golang.org/x/oauth2" go.mod -B 2 -A 2Repository: openshift/builder Length of output: 333 🌐 Web query:
💡 Result: The latest version of golang.org/x/oauth2 (as of 2026-05-14) is v0.36.0. [1] Does the latest version fix vulnerabilities GO-2025-3488 and GHSA-6v2p-p543-phr9? Yes. Both GO-2025-3488 and GHSA-6v2p-p543-phr9 are described as being fixed starting in golang.org/x/oauth2 v0.27.0 (affected “before v0.27.0”). [2][3] Since v0.36.0 is greater than v0.27.0, upgrading to v0.36.0 addresses these issues. [1][2][3] Supporting details: - GO-2025-3488 affects golang.org/x/oauth2 versions “before v0.27.0”. [2] - GHSA-6v2p-p543-phr9 affects golang.org/x/oauth2 versions “before v0.27.0”. [3] - The oauth2 v0.27.0 tag includes a fix commit “jws: split token into fixed number of parts” and references fixes for CVE-2025-22868 / GO-2025-3488. [4] Citations:
Upgrade The current version has HIGH severity vulnerabilities:
Both are fixed in v0.27.0+. Latest version is v0.36.0. 🧰 Tools🪛 OSV Scanner (2.3.8)[HIGH] 163-163: golang.org/x/oauth2 0.18.0: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (GO-2025-3488) [HIGH] 163-163: golang.org/x/oauth2 0.18.0: golang.org/x/oauth2 Improper Validation of Syntactic Correctness of Input vulnerability 🤖 Prompt for AI Agents |
||
| golang.org/x/sync v0.7.0 // indirect | ||
| golang.org/x/term v0.13.0 // indirect | ||
| golang.org/x/text v0.13.0 // indirect | ||
| golang.org/x/time v0.0.0-20220210224613-90d013bbcef8 // indirect | ||
| google.golang.org/appengine v1.6.7 // indirect | ||
| google.golang.org/genproto v0.0.0-20220624142145-8cd45d7dbd1f // indirect | ||
| google.golang.org/grpc v1.47.0 // indirect | ||
| google.golang.org/protobuf v1.28.0 // indirect | ||
| golang.org/x/text v0.16.0 // indirect | ||
| golang.org/x/time v0.5.0 // indirect | ||
| google.golang.org/appengine v1.6.8 // indirect | ||
| google.golang.org/grpc v1.62.1 // indirect | ||
| google.golang.org/protobuf v1.33.0 // indirect | ||
| gopkg.in/inf.v0 v0.9.1 // indirect | ||
| gopkg.in/ini.v1 v1.66.2 // indirect | ||
| gopkg.in/square/go-jose.v2 v2.6.0 // indirect | ||
|
|
@@ -194,6 +193,7 @@ require ( | |
| github.com/sigstore/sigstore v1.3.1-0.20220629021053-b95fc0d626c1 // indirect | ||
| github.com/theupdateframework/go-tuf v0.5.0 // indirect | ||
| github.com/titanous/rocacheck v0.0.0-20171023193734-afe73141d399 // indirect | ||
| google.golang.org/genproto/googleapis/rpc v0.0.0-20240318140521-94a12d6c2237 // indirect | ||
| ) | ||
|
|
||
| replace ( | ||
|
|
@@ -232,3 +232,5 @@ replace ( | |
| k8s.io/pod-security-admission => k8s.io/pod-security-admission v0.25.2 | ||
| k8s.io/sample-apiserver => k8s.io/sample-apiserver v0.25.2 | ||
| ) | ||
|
|
||
| replace google.golang.org/grpc => github.com/openshift-sustaining/grpc-go v1.64.1-sec.1 | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🧩 Analysis chain🏁 Script executed: #!/bin/bash
# Check if the openshift-sustaining fork and version exist and gather release information
gh api repos/openshift-sustaining/grpc-go/tags --jq '.[] | select(.name | contains("v1.64.1-sec")) | {name: .name, commit: .commit.sha}'
# Check for any security-related information in the fork
gh api repos/openshift-sustaining/grpc-go/releases --jq '.[] | select(.tag_name | contains("v1.64.1-sec")) | {tag: .tag_name, name: .name, body: .body}'Repository: openshift/builder Length of output: 450 🌐 Web query:
💡 Result: No, grpc-go v1.64.1-sec.1 from the openshift-sustaining fork does not correspond to google.golang.org/grpc v1.79.3, and it does not address CVE-2026-33186.[1][2] Citations:
Update PR title or explain the version discrepancy. The PR title claims to bump gRPC to v1.79.3, but the replace directive uses 🤖 Prompt for AI Agents |
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
🏁 Script executed:
Repository: openshift/builder
Length of output: 14947
🌐 Web query:
What is the latest version of github.com/sirupsen/logrus and does it fix the DoS vulnerabilities GO-2025-4188 and GHSA-4f99-4q7p-p3gh?💡 Result:
Latest github.com/sirupsen/logrus version (as of 2026-05-14): v1.9.4 [1][2][3]. Does v1.9.4 fix the DoS vulnerabilities GO-2025-4188 and GHSA-4f99-4q7p-p3gh? Yes. These advisories describe a DoS when using Entry.Writer/Writer (or Entry.writerScanner) with a single-line payload >64KB without newlines, affecting logrus versions < 1.8.3 and specific 1.9.x ranges [4][5][6]. They state the issue is fixed in 1.8.3/1.9.1/1.9.3+ (i.e., versions at or above those fix releases) [4][6][5]. Since v1.9.4 is 1.9.3+ (and the logrus changelog notes repeated fixes for the >64KB single-line Writer DoS in 1.9.1/1.9.3) [7], v1.9.4 should be fixed for GHSA-4f99-4q7p-p3gh and thus also for GO-2025-4188 (which lists the GHSA as an alias/reference) [4].
Citations:
Upgrade logrus to v1.9.4 to fix HIGH severity DoS vulnerabilities.
github.com/sirupsen/logrus v1.9.0contains two HIGH severity DoS vulnerabilities:These are fixed in v1.9.4. Update the dependency to patch the vulnerability.
🧰 Tools
🪛 OSV Scanner (2.3.8)
[HIGH] 137-137: github.com/sirupsen/logrus 1.9.0: Logrus is vulnerable to DoS when using Entry.writerScanner in github.com/sirupsen/logrus
(GO-2025-4188)
[HIGH] 137-137: github.com/sirupsen/logrus 1.9.0: Logrus is vulnerable to DoS when using Entry.Writer()
(GHSA-4f99-4q7p-p3gh)
🤖 Prompt for AI Agents