VYPR
Moderate severityNVD Advisory· Published Mar 6, 2026· Updated Mar 9, 2026

melange: unbounded HTTP download in `melange update-cache` can exhaust disk in CI

CVE-2026-29049

Description

melange allows users to build apk packages using declarative pipelines. In version 0.40.5 and prior, melange update-cache downloads URIs from build configs via io.Copy without any size limit or HTTP client timeout (pkg/renovate/cache/cache.go). An attacker-controlled URI in a melange config can cause unbounded disk writes, exhausting disk on the build runne. There is no known patch publicly available.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unbounded HTTP download in melange update-cache can exhaust disk on build runners via attacker-controlled URIs.

Vulnerability

CVE-2026-29049 is a resource exhaustion vulnerability in the melange update-cache functionality of melange (up to version 0.40.5). The bug lives in pkg/renovate/cache/cache.go, where the code uses io.Copy to download content referenced by URIs in build configuration files without imposing any size limit or HTTP client timeout [1]. This means an attacker can supply a URI that points to a large or infinite stream of data.

Exploitation

An attacker with the ability to influence a melange build configuration (for example, by submitting a malicious pull request to a CI pipeline that uses melange) can set a update-cache URI to point to an attacker-controlled endpoint that sends data indefinitely. No authentication or special privileges beyond writing to a melange config file are needed [2]. The build runner will then download that content unboundedly.

Impact

Because the download has no size quota, it can exhaust available disk space on the build runner. In CI/CD environments, this can lead to denial of service for the runner, impacting all builds that share that infrastructure. There is no confidentiality or integrity impact described, but availability is severely affected [3].

Mitigation

As of the publication date (March 6, 2026), no patch is publicly available [1]. Users are advised to restrict the ability to modify melange configurations to trusted parties only, and to monitor disk usage on runners that process external build configs. Until a patch is released, manual validation of URIs in update-cache directives or use of network-level controls to limit download sizes may be necessary.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
chainguard.dev/melangeGo
<= 0.40.5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.