CVE-2026-29049

Medium
|4.3
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to make a build process download files from a specified location without any limits, potentially filling up the disk space on the server running the build. To exploit this, the attacker needs to control the URI in the build configuration, and there is currently no fix available.

Technical Description

melange allows users to build apk packages using declarative pipelines. In version 0.40.5 and prior, melange update-cache downloads URIs from build configs via io.Copy without any size limit or HTTP client timeout (pkg/renovate/cache/cache.go). An attacker-controlled URI in a melange config can cause unbounded disk writes, exhausting disk on the build runne. There is no known patch publicly available.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactLow
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$552($500-$1K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Mar 6, 2026

about 1 month ago

Last Modified

Mar 10, 2026

28 days ago

Vendor

chainguard

Product

melange