Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/golang-google-grpc@1.64.0-7
Typedeb
Namespacedebian
Namegolang-google-grpc
Version1.64.0-7
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.79.3-1
Latest_non_vulnerable_version1.79.3-1
Affected_by_vulnerabilities
0
url VCID-mhf1-8kyt-pbbx
vulnerability_id VCID-mhf1-8kyt-pbbx
summary
gRPC-Go has an authorization bypass via missing leading slash in :path
### Impact
_What kind of vulnerability is it? Who is impacted?_

It is an **Authorization Bypass** resulting from **Improper Input Validation** of the HTTP/2 `:path` pseudo-header.

The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, "deny" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback "allow" rule was present.

**Who is impacted?**
This affects gRPC-Go servers that meet both of the following criteria:
1. They use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`.
2. Their security policy contains specific "deny" rules for canonical paths but allows other requests by default (a fallback "allow" rule).

The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server.

### Patches
_Has the problem been patched? What versions should users upgrade to?_

Yes, the issue has been patched. The fix ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string.

Users should upgrade to the following versions (or newer):
* **v1.79.3**
* The latest **master** branch.

It is recommended that all users employing path-based authorization (especially `grpc/authz`) upgrade as soon as the patch is available in a tagged release.

### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_

While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods:

#### 1. Use a Validating Interceptor (Recommended Mitigation)
Add an "outermost" interceptor to your server that validates the path before any other authorization logic runs:

```go
func pathValidationInterceptor(ctx context.Context, req any, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (any, error) {
    if info.FullMethod == "" || info.FullMethod[0] != '/' {
        return nil, status.Errorf(codes.Unimplemented, "malformed method name")
    }   
    return handler(ctx, req)
}

// Ensure this is the FIRST interceptor in your chain
s := grpc.NewServer(
    grpc.ChainUnaryInterceptor(pathValidationInterceptor, authzInterceptor),
)
```

#### 2. Infrastructure-Level Normalization
If your gRPC server is behind a reverse proxy or load balancer (such as Envoy, NGINX, or an L7 Cloud Load Balancer), ensure it is configured to enforce strict HTTP/2 compliance for pseudo-headers and reject or normalize requests where the `:path` header does not start with a leading slash.

#### 3. Policy Hardening
Switch to a "default deny" posture in your authorization policies (explicitly listing all allowed paths and denying everything else) to reduce the risk of bypasses via malformed inputs.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33186.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33186
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02582
published_at 2026-04-07T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02565
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02609
published_at 2026-04-09T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02579
published_at 2026-04-04T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02588
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03421
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03345
published_at 2026-04-16T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.0337
published_at 2026-04-13T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03393
published_at 2026-04-12T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03357
published_at 2026-04-18T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05413
published_at 2026-05-07T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05377
published_at 2026-04-26T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05376
published_at 2026-04-29T12:55:00Z
13
value 0.0002
scoring_system epss
scoring_elements 0.05367
published_at 2026-05-05T12:55:00Z
14
value 0.00023
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-21T12:55:00Z
15
value 0.00023
scoring_system epss
scoring_elements 0.06296
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33186
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/grpc/grpc-go
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/grpc/grpc-go
5
reference_url https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-24T18:08:38Z/
url https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33186
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33186
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132228
reference_id 1132228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132228
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449833
reference_id 2449833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449833
9
reference_url https://access.redhat.com/errata/RHSA-2026:10093
reference_id RHSA-2026:10093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10093
10
reference_url https://access.redhat.com/errata/RHSA-2026:10094
reference_id RHSA-2026:10094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10094
11
reference_url https://access.redhat.com/errata/RHSA-2026:10105
reference_id RHSA-2026:10105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10105
12
reference_url https://access.redhat.com/errata/RHSA-2026:10107
reference_id RHSA-2026:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10107
13
reference_url https://access.redhat.com/errata/RHSA-2026:10125
reference_id RHSA-2026:10125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10125
14
reference_url https://access.redhat.com/errata/RHSA-2026:10126
reference_id RHSA-2026:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10126
15
reference_url https://access.redhat.com/errata/RHSA-2026:10130
reference_id RHSA-2026:10130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10130
16
reference_url https://access.redhat.com/errata/RHSA-2026:10131
reference_id RHSA-2026:10131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10131
17
reference_url https://access.redhat.com/errata/RHSA-2026:10153
reference_id RHSA-2026:10153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10153
18
reference_url https://access.redhat.com/errata/RHSA-2026:10155
reference_id RHSA-2026:10155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10155
19
reference_url https://access.redhat.com/errata/RHSA-2026:10158
reference_id RHSA-2026:10158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10158
20
reference_url https://access.redhat.com/errata/RHSA-2026:10172
reference_id RHSA-2026:10172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10172
21
reference_url https://access.redhat.com/errata/RHSA-2026:10175
reference_id RHSA-2026:10175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10175
22
reference_url https://access.redhat.com/errata/RHSA-2026:10698
reference_id RHSA-2026:10698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10698
23
reference_url https://access.redhat.com/errata/RHSA-2026:10705
reference_id RHSA-2026:10705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10705
24
reference_url https://access.redhat.com/errata/RHSA-2026:10706
reference_id RHSA-2026:10706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10706
25
reference_url https://access.redhat.com/errata/RHSA-2026:11070
reference_id RHSA-2026:11070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11070
26
reference_url https://access.redhat.com/errata/RHSA-2026:11217
reference_id RHSA-2026:11217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11217
27
reference_url https://access.redhat.com/errata/RHSA-2026:11330
reference_id RHSA-2026:11330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11330
28
reference_url https://access.redhat.com/errata/RHSA-2026:11331
reference_id RHSA-2026:11331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11331
29
reference_url https://access.redhat.com/errata/RHSA-2026:11408
reference_id RHSA-2026:11408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11408
30
reference_url https://access.redhat.com/errata/RHSA-2026:11803
reference_id RHSA-2026:11803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11803
31
reference_url https://access.redhat.com/errata/RHSA-2026:11856
reference_id RHSA-2026:11856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11856
32
reference_url https://access.redhat.com/errata/RHSA-2026:11916
reference_id RHSA-2026:11916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11916
33
reference_url https://access.redhat.com/errata/RHSA-2026:11996
reference_id RHSA-2026:11996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11996
34
reference_url https://access.redhat.com/errata/RHSA-2026:12116
reference_id RHSA-2026:12116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:12116
35
reference_url https://access.redhat.com/errata/RHSA-2026:12118
reference_id RHSA-2026:12118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:12118
36
reference_url https://access.redhat.com/errata/RHSA-2026:12119
reference_id RHSA-2026:12119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:12119
37
reference_url https://access.redhat.com/errata/RHSA-2026:12277
reference_id RHSA-2026:12277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:12277
38
reference_url https://access.redhat.com/errata/RHSA-2026:12279
reference_id RHSA-2026:12279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:12279
39
reference_url https://access.redhat.com/errata/RHSA-2026:12283
reference_id RHSA-2026:12283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:12283
40
reference_url https://access.redhat.com/errata/RHSA-2026:12337
reference_id RHSA-2026:12337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:12337
41
reference_url https://access.redhat.com/errata/RHSA-2026:13548
reference_id RHSA-2026:13548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13548
42
reference_url https://access.redhat.com/errata/RHSA-2026:13791
reference_id RHSA-2026:13791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13791
43
reference_url https://access.redhat.com/errata/RHSA-2026:13829
reference_id RHSA-2026:13829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13829
44
reference_url https://access.redhat.com/errata/RHSA-2026:6174
reference_id RHSA-2026:6174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6174
45
reference_url https://access.redhat.com/errata/RHSA-2026:6428
reference_id RHSA-2026:6428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6428
46
reference_url https://access.redhat.com/errata/RHSA-2026:6564
reference_id RHSA-2026:6564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6564
47
reference_url https://access.redhat.com/errata/RHSA-2026:6802
reference_id RHSA-2026:6802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6802
48
reference_url https://access.redhat.com/errata/RHSA-2026:7110
reference_id RHSA-2026:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7110
49
reference_url https://access.redhat.com/errata/RHSA-2026:7128
reference_id RHSA-2026:7128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7128
50
reference_url https://access.redhat.com/errata/RHSA-2026:7245
reference_id RHSA-2026:7245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7245
51
reference_url https://access.redhat.com/errata/RHSA-2026:8151
reference_id RHSA-2026:8151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8151
52
reference_url https://access.redhat.com/errata/RHSA-2026:8338
reference_id RHSA-2026:8338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8338
53
reference_url https://access.redhat.com/errata/RHSA-2026:8433
reference_id RHSA-2026:8433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8433
54
reference_url https://access.redhat.com/errata/RHSA-2026:8449
reference_id RHSA-2026:8449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8449
55
reference_url https://access.redhat.com/errata/RHSA-2026:8483
reference_id RHSA-2026:8483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8483
56
reference_url https://access.redhat.com/errata/RHSA-2026:8484
reference_id RHSA-2026:8484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8484
57
reference_url https://access.redhat.com/errata/RHSA-2026:8490
reference_id RHSA-2026:8490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8490
58
reference_url https://access.redhat.com/errata/RHSA-2026:8491
reference_id RHSA-2026:8491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8491
59
reference_url https://access.redhat.com/errata/RHSA-2026:8493
reference_id RHSA-2026:8493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8493
60
reference_url https://access.redhat.com/errata/RHSA-2026:9385
reference_id RHSA-2026:9385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9385
61
reference_url https://access.redhat.com/errata/RHSA-2026:9388
reference_id RHSA-2026:9388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9388
62
reference_url https://access.redhat.com/errata/RHSA-2026:9440
reference_id RHSA-2026:9440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9440
63
reference_url https://access.redhat.com/errata/RHSA-2026:9448
reference_id RHSA-2026:9448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9448
64
reference_url https://access.redhat.com/errata/RHSA-2026:9453
reference_id RHSA-2026:9453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9453
65
reference_url https://access.redhat.com/errata/RHSA-2026:9872
reference_id RHSA-2026:9872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9872
fixed_packages
0
url pkg:deb/debian/golang-google-grpc@1.66.3-2
purl pkg:deb/debian/golang-google-grpc@1.66.3-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mhf1-8kyt-pbbx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-google-grpc@1.66.3-2
1
url pkg:deb/debian/golang-google-grpc@1.79.3-1
purl pkg:deb/debian/golang-google-grpc@1.79.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-google-grpc@1.79.3-1
aliases CVE-2026-33186, GHSA-p77j-4mvh-x3m3
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhf1-8kyt-pbbx
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-google-grpc@1.64.0-7