Skip to content

fix(deps): vuln minor: github.com/DataDog/datadog-lambda-go, go.opentelemetry.io/otel/sdk, google.golang.org/grpc [examples/lambda]#587

Open
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomainfrom
engraver-auto-version-upgrade/minorpatch/go/lambda/0-1776959083
Open

fix(deps): vuln minor: github.com/DataDog/datadog-lambda-go, go.opentelemetry.io/otel/sdk, google.golang.org/grpc [examples/lambda]#587
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit intomainfrom
engraver-auto-version-upgrade/minorpatch/go/lambda/0-1776959083

Conversation

@gh-worker-campaigns-3e9aa4
Copy link
Copy Markdown
Contributor

Summary: Critical-severity security update — 3 packages upgraded (MINOR changes included)

Manifests changed:

  • examples/lambda (go)

✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.


Updates

Package From To Type Dep Type Vulnerabilities Fixed
google.golang.org/grpc v1.72.0 v1.80.0 minor Transitive 3 CRITICAL
go.opentelemetry.io/otel/sdk v1.35.0 v1.43.0 minor Transitive 4 HIGH
github.com/DataDog/datadog-lambda-go v1.31.0 v1.32.0 minor Direct -

Packages marked with "-" are updated due to dependency constraints.


Security Details

🚨 Critical & High Severity (7 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
google.golang.org/grpc GO-2026-4762 critical Authorization bypass in gRPC-Go via missing leading slash in :path in google.golang.org/grpc v1.72.0 1.79.3
google.golang.org/grpc CVE-2026-33186 critical gRPC-Go has an authorization bypass via missing leading slash in :path v1.72.0 -
google.golang.org/grpc GHSA-p77j-4mvh-x3m3 CRITICAL gRPC-Go has an authorization bypass via missing leading slash in :path v1.72.0 1.79.3
go.opentelemetry.io/otel/sdk GHSA-9h8m-3fm2-qjrq HIGH OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking v1.35.0 1.40.0
go.opentelemetry.io/otel/sdk CVE-2026-24051 HIGH OpenTelemetry-Go Affected by Arbitrary Code Execution via PATH Hijacking v1.35.0 -
go.opentelemetry.io/otel/sdk GO-2026-4394 HIGH OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking in go.opentelemetry.io/otel/sdk v1.35.0 1.40.0
go.opentelemetry.io/otel/sdk GHSA-hfvc-g4fc-pqhx HIGH opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking v1.35.0 1.43.0

Review Checklist

Standard review:

  • Review changes for compatibility with your code
  • Check for breaking changes in release notes
  • Run tests locally or wait for CI
  • Approve and merge this PR

Update Mode: Vulnerability Remediation (Critical/High)

🤖 Generated by DataDog Automated Dependency Management System

@dd-prapprover
Copy link
Copy Markdown

dd-prapprover Bot commented Apr 24, 2026

PRApprover will approve and merge this PR, FAQ, #dx-source-code-management

🛠️ PRApproval Status

  • ✅ PR is eligible for auto-approval by rule dependency-management-version-updater - 2026-04-24T14:34:30Z
  • ✅ CI tests passed - 2026-04-24T14:34:34Z
  • ✅ Approved (commit: ad7fb36) - 2026-04-24T14:34:36Z
  • ✅ Merge Started
  • ⬜ Merged

➡️ Current phase: merge in progress...

Copy link
Copy Markdown

@dd-prapprover dd-prapprover Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR has been automatically approved by the DD PR Approver bot.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants