CVE-2026-29049

4.3 MEDIUM

📋 TL;DR

This vulnerability in melange allows attackers to cause disk exhaustion on build runners by specifying malicious URIs in build configurations. The update-cache function downloads files without size limits or timeouts, enabling unbounded disk writes. Users running melange version 0.40.5 or earlier for APK package building are affected.

💻 Affected Systems

Products:
  • melange
Versions: 0.40.5 and prior
Operating Systems: All platforms running melange
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when using update-cache functionality with external URIs.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disk exhaustion on build runners causing service disruption, data loss, and potential denial of service for all builds on affected systems.

🟠

Likely Case

Build runner disk space exhaustion leading to failed builds and temporary service disruption until disk space is manually cleared.

🟢

If Mitigated

Controlled disk usage with monitoring alerts triggering before critical exhaustion, allowing proactive intervention.

🌐 Internet-Facing: MEDIUM - Attack requires attacker to control melange build configurations, which typically requires some level of access or compromise.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to disrupt build pipelines.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to modify melange build configurations or inject malicious URIs into build pipelines.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://github.com/chainguard-dev/melange/security/advisories/GHSA-7rp8-r62p-q6wc

Restart Required: No

Instructions:

No official patch available. Monitor vendor advisory for updates and apply when released.

🔧 Temporary Workarounds

Implement URI validation and restrictions

all

Restrict melange configurations to only allow URIs from trusted sources and implement URI validation.

Set disk quotas on build runners

linux

Implement filesystem quotas to limit disk usage per build process or user.

# Linux example: setquota -u builduser 1000000 1200000 0 0 /

🧯 If You Can't Patch

  • Monitor disk usage on build runners with aggressive alerting thresholds
  • Restrict who can submit melange build configurations and implement code review for config changes

🔍 How to Verify

Check if Vulnerable:

Check melange version: melange version. If version is 0.40.5 or earlier, system is vulnerable.

Check Version:

melange version

Verify Fix Applied:

When patch becomes available, verify version is greater than 0.40.5 and test update-cache functionality with controlled URIs.

📡 Detection & Monitoring

Log Indicators:

  • Rapid disk space consumption on build runners
  • Large file downloads in melange logs
  • Failed builds due to disk space errors

Network Indicators:

  • Unusual outbound connections from build runners to external URIs
  • Large data transfers to build runners

SIEM Query:

source="melange" AND ("update-cache" OR "downloading") AND size>1000000000

🔗 References

📤 Share & Export