{"schema_version":"1.7.2","id":"OESA-2026-1887","modified":"2026-04-11T14:05:16Z","published":"2026-04-11T14:05:16Z","upstream":["CVE-2026-33186"],"summary":"kata-containers security update","details":"This is core component of Kata Container, to make it work, you need a isulad/docker engine.\r\n\r\nSecurity Fix(es):\n\ngRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, &quot;deny&quot; rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback &quot;allow&quot; rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific &quot;deny&quot; rules for canonical paths but allows other requests by default (a fallback &quot;allow&quot; rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.(CVE-2026-33186)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"kata-containers","purl":"pkg:rpm/openEuler/kata-containers&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.0-18.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["kata-containers-3.2.0-17.oe2403.aarch64.rpm","kata-containers-3.2.0-18.oe2403sp1.aarch64.rpm","kata-containers-3.2.0-18.oe2403sp2.aarch64.rpm","kata-containers-3.2.0-18.oe2403sp3.aarch64.rpm"],"src":["kata-containers-3.2.0-17.oe2403.src.rpm","kata-containers-3.2.0-18.oe2403sp1.src.rpm","kata-containers-3.2.0-18.oe2403sp2.src.rpm","kata-containers-3.2.0-18.oe2403sp3.src.rpm"],"x86_64":["kata-containers-3.2.0-17.oe2403.x86_64.rpm","kata-containers-3.2.0-18.oe2403sp1.x86_64.rpm","kata-containers-3.2.0-18.oe2403sp2.x86_64.rpm","kata-containers-3.2.0-18.oe2403sp3.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS-SP1","name":"kata-containers","purl":"pkg:rpm/openEuler/kata-containers&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.0-18.oe2403sp1"}]}],"ecosystem_specific":{"aarch64":["kata-containers-3.2.0-18.oe2403sp1.aarch64.rpm"],"src":["kata-containers-3.2.0-18.oe2403sp1.src.rpm"],"x86_64":["kata-containers-3.2.0-18.oe2403sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS-SP2","name":"kata-containers","purl":"pkg:rpm/openEuler/kata-containers&distro=openEuler-24.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.0-18.oe2403sp2"}]}],"ecosystem_specific":{"aarch64":["kata-containers-3.2.0-18.oe2403sp2.aarch64.rpm"],"src":["kata-containers-3.2.0-18.oe2403sp2.src.rpm"],"x86_64":["kata-containers-3.2.0-18.oe2403sp2.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"kata-containers","purl":"pkg:rpm/openEuler/kata-containers&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.0-18.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["kata-containers-3.2.0-18.oe2403sp3.aarch64.rpm"],"src":["kata-containers-3.2.0-18.oe2403sp3.src.rpm"],"x86_64":["kata-containers-3.2.0-18.oe2403sp3.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"kata-containers","purl":"pkg:rpm/openEuler/kata-containers&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"v1.11.1-20.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["kata-containers-v1.11.1-20.oe2003sp4.aarch64.rpm"],"src":["kata-containers-v1.11.1-20.oe2003sp4.src.rpm"],"x86_64":["kata-containers-v1.11.1-20.oe2003sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"kata-containers","purl":"pkg:rpm/openEuler/kata-containers&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.11.1-34.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["kata-containers-1.11.1-34.oe2203sp4.aarch64.rpm"],"src":["kata-containers-1.11.1-34.oe2203sp4.src.rpm"],"x86_64":["kata-containers-1.11.1-34.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1887"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33186"}],"database_specific":{"severity":"Critical"}}
