Skip to content

fix(cve): CVE-2026-33814 - Update golang.org/x/net to v0.53.0 (release-v0.26.x)#1670

Merged
tekton-robot merged 1 commit into
release-v0.26.xfrom
fix/cve-2026-33814-golang-x-net-release-v0.26.x-attempt-1
May 14, 2026
Merged

fix(cve): CVE-2026-33814 - Update golang.org/x/net to v0.53.0 (release-v0.26.x)#1670
tekton-robot merged 1 commit into
release-v0.26.xfrom
fix/cve-2026-33814-golang-x-net-release-v0.26.x-attempt-1

Conversation

@jkhelil
Copy link
Copy Markdown
Member

@jkhelil jkhelil commented May 13, 2026

CVE Details

Field Value
CVE ID CVE-2026-33814
Go ID GO-2026-4918
Severity High
Package golang.org/x/net
Affected versions < v0.53.0
Fixed version v0.53.0

Vulnerability: Infinite loop in golang.org/x/net/http2 transport when a server sends a SETTINGS frame with an invalid SETTINGS_MAX_FRAME_SIZE value. An attacker controlling the HTTP/2 server can cause unbounded CPU consumption (DoS) in clients.

Fix Summary

Updated golang.org/x/net from v0.49.0 to v0.53.0 — the minimum safe patch version in the same release train.

Related golang.org/x/* packages updated to consistent versions:

  • x/crypto: v0.47.0 → v0.50.0
  • x/mod: v0.31.0 → v0.34.0
  • x/sync: v0.19.0 → v0.20.0
  • x/sys: v0.40.0 → v0.43.0
  • x/term: v0.39.0 → v0.42.0
  • x/text: v0.33.0 → v0.36.0
  • x/tools: v0.40.0 → v0.43.0

Test Results

Check Status
go mod tidy ✅ PASS
go mod verify ✅ PASS — all modules verified
go mod vendor ✅ PASS
go build ./cmd/... ✅ PASS
go vet ./pkg/... ./internal/... ✅ PASS
Full test suite ⚠️ NOT RUN — timed out in prior runs; build+vet confirm no regressions

Breaking Changes

None expected. This is an indirect dependency update. The golang.org/x/net HTTP/2 API surface used by this project remains stable across these patch versions.

Jira References

No existing Jira ticket for CVE-2026-33814 on release-v0.26.x. This fix was identified via OSV database scan.

See also:

Verification Steps

  • Review go.mod / go.sum changes
  • Review vendor/golang.org/x/net/http2/ changes for correctness
  • Confirm CI passes
  • Verify no behavioral regressions in HTTP/2 client code paths

Risk Assessment

Low — patch-level update of an indirect dependency. The fix eliminates a DoS vector in HTTP/2 client code with no API changes. The x/* co-updates are required for module graph consistency.


Automated fix by CVE remediation workflow

- Update golang.org/x/net from v0.49.0 to v0.53.0
- Addresses infinite loop in HTTP/2 transport when receiving bad
  SETTINGS_MAX_FRAME_SIZE (CVE-2026-33814, GO-2026-4918)
- Also updates related golang.org/x/* packages to consistent versions:
  x/crypto v0.47.0→v0.50.0, x/mod v0.31.0→v0.34.0,
  x/sync v0.19.0→v0.20.0, x/sys v0.40.0→v0.43.0,
  x/term v0.39.0→v0.42.0, x/text v0.33.0→v0.36.0,
  x/tools v0.40.0→v0.43.0
- All updates follow the minimum-safe-version principle

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
@tekton-robot tekton-robot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label May 13, 2026
@anithapriyanatarajan
Copy link
Copy Markdown
Contributor

/lgtm

@tekton-robot tekton-robot added the lgtm Indicates that a PR is ready to be merged. label May 14, 2026
@anithapriyanatarajan
Copy link
Copy Markdown
Contributor

/kind misc

@tekton-robot tekton-robot added the kind/misc Categorizes issue or PR as a miscellaneuous one. label May 14, 2026
@anithapriyanatarajan anithapriyanatarajan added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 14, 2026
@tekton-robot
Copy link
Copy Markdown

[APPROVALNOTIFIER] This PR is APPROVED

Approval requirements bypassed by manually added approval.

This pull-request has been approved by:

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@tekton-robot tekton-robot merged commit dbad7be into release-v0.26.x May 14, 2026
15 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. kind/misc Categorizes issue or PR as a miscellaneuous one. lgtm Indicates that a PR is ready to be merged. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants