melange: unbounded HTTP download in `melange update-cache` can exhaust disk in CI
Description
melange allows users to build apk packages using declarative pipelines. In version 0.40.5 and prior, melange update-cache downloads URIs from build configs via io.Copy without any size limit or HTTP client timeout (pkg/renovate/cache/cache.go). An attacker-controlled URI in a melange config can cause unbounded disk writes, exhausting disk on the build runne. There is no known patch publicly available.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unbounded HTTP download in melange update-cache can exhaust disk on build runners via attacker-controlled URIs.
Vulnerability
CVE-2026-29049 is a resource exhaustion vulnerability in the melange update-cache functionality of melange (up to version 0.40.5). The bug lives in pkg/renovate/cache/cache.go, where the code uses io.Copy to download content referenced by URIs in build configuration files without imposing any size limit or HTTP client timeout [1]. This means an attacker can supply a URI that points to a large or infinite stream of data.
Exploitation
An attacker with the ability to influence a melange build configuration (for example, by submitting a malicious pull request to a CI pipeline that uses melange) can set a update-cache URI to point to an attacker-controlled endpoint that sends data indefinitely. No authentication or special privileges beyond writing to a melange config file are needed [2]. The build runner will then download that content unboundedly.
Impact
Because the download has no size quota, it can exhaust available disk space on the build runner. In CI/CD environments, this can lead to denial of service for the runner, impacting all builds that share that infrastructure. There is no confidentiality or integrity impact described, but availability is severely affected [3].
Mitigation
As of the publication date (March 6, 2026), no patch is publicly available [1]. Users are advised to restrict the ability to modify melange configurations to trusted parties only, and to monitor disk usage on runners that process external build configs. Until a patch is released, manual validation of URIs in update-cache directives or use of network-level controls to limit download sizes may be necessary.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
chainguard.dev/melangeGo | <= 0.40.5 | — |
Affected products
2- Range: <=0.40.5
- chainguard-dev/melangev5Range: <= 0.40.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-7rp8-r62p-q6wcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-29049ghsaADVISORY
- github.com/chainguard-dev/melange/security/advisories/GHSA-7rp8-r62p-q6wcghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.