Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29049: CWE-400: Uncontrolled Resource Consumption in chainguard-dev melange

0
Medium
VulnerabilityCVE-2026-29049cvecve-2026-29049cwe-400cwe-918
Published: Fri Mar 06 2026 (03/06/2026, 07:03:10 UTC)
Source: CVE Database V5
Vendor/Project: chainguard-dev
Product: melange

Description

melange allows users to build apk packages using declarative pipelines. In version 0.40.5 and prior, melange update-cache downloads URIs from build configs via io.Copy without any size limit or HTTP client timeout (pkg/renovate/cache/cache.go). An attacker-controlled URI in a melange config can cause unbounded disk writes, exhausting disk on the build runne. There is no known patch publicly available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:36:55 UTC

Technical Analysis

The vulnerability CVE-2026-29049 affects chainguard-dev's melange tool, specifically versions 0.40.5 and earlier. Melange is used to build APK packages through declarative pipelines. The issue lies in the update-cache component (pkg/renovate/cache/cache.go), where the function downloads data from URIs specified in build configurations using io.Copy without imposing any size restrictions or HTTP client timeouts. Because the URI is attacker-controlled, an adversary can craft a malicious build configuration that points to a resource that causes unbounded data downloads and disk writes. This leads to uncontrolled resource consumption, specifically disk space exhaustion on the build runner environment. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption) and CWE-918 (Server-Side Request Forgery), indicating that the attacker can influence server-side requests to cause resource depletion. Exploitation does not require authentication but does require user interaction to supply a malicious build configuration. The CVSS v3.1 base score is 4.3 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction, and impacting availability only. No patches or fixes have been publicly released at the time of publication, and no known exploits have been observed in the wild. This vulnerability can disrupt build pipelines by causing denial of service due to disk exhaustion, potentially delaying software delivery and impacting development operations.

Potential Impact

The primary impact of this vulnerability is denial of service through disk space exhaustion on build runner systems. Organizations relying on melange for automated APK package builds may experience build failures, pipeline interruptions, and degraded developer productivity. In environments with limited disk capacity or shared build infrastructure, this could lead to cascading failures affecting multiple projects or teams. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact can delay software releases and increase operational costs. Attackers could exploit this flaw to disrupt continuous integration/continuous deployment (CI/CD) workflows, potentially impacting organizations that depend on rapid and reliable build processes. Since the vulnerability requires user interaction to supply malicious configurations, insider threats or compromised developer environments could increase risk. The lack of a public patch means organizations must rely on mitigations until an official fix is released.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict validation and sanitization of build configurations to prevent untrusted or attacker-controlled URIs from being used in melange pipelines. Restricting who can submit or modify build configurations reduces risk. Network-level controls such as egress filtering and limiting outbound HTTP requests from build runners can prevent access to malicious URIs. Monitoring disk usage on build runners with alerting for abnormal growth can enable early detection of exploitation attempts. Employing container or VM resource quotas can limit the impact of resource exhaustion. If possible, temporarily disabling or isolating the update-cache functionality until a patch is available can reduce exposure. Organizations should track chainguard-dev announcements for patches and apply updates promptly once released. Additionally, consider implementing HTTP client timeouts and size limits in custom wrappers or proxy layers if modifying melange is feasible internally.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T17:50:11.243Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aa7f36c48b3f10ff26b92f

Added to database: 3/6/2026, 7:16:06 AM

Last enriched: 3/13/2026, 7:36:55 PM

Last updated: 4/19/2026, 12:18:27 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses