Skip to content

chore(deps): update alertmanager to v0.32.0#20591

Merged
github-actions[bot] merged 1 commit intomainfrom
renovate/alertmanager-0.x
Apr 9, 2026
Merged

chore(deps): update alertmanager to v0.32.0#20591
github-actions[bot] merged 1 commit intomainfrom
renovate/alertmanager-0.x

Conversation

@uniget-bot
Copy link
Copy Markdown

This PR contains the following updates:

Package Update Change
alertmanager minor 0.31.10.32.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

prometheus/alertmanager (alertmanager)

v0.32.0

Compare Source

  • [CHANGE] go get github.com/prometheus/alertmanager/ui will now fail as compiled UI assets are no longer checked into the repository. Downstream builds that rely on these assets being present in the source tree must now build the UI from source. #​5113
  • [CHANGE] The '--enable-feature=auto-gomaxprocs' option is deprecated and will be removed in v0.33. This flag currently has no effect and can be safely removed from any startup scripts. #​5090
  • [CHANGE] Update internal function signatures across multiple packages. This affects any project that integrates Alertmanager code.
  • [ENHANCEMENT] Add static asset caching. #​5113
  • [ENHANCEMENT] Reduce memory allocations through pre-sizing collections and batch allocation. #​5020
  • [ENHANCEMENT] Replace help with documentation in navigation bar. #​4943
  • [ENHANCEMENT] docs(ha): Update high availability documentation. #​5136
  • [ENHANCEMENT] docs: Add auth_secret_file for smtp in document. #​5036
  • [ENHANCEMENT] docs: Add description for global telegram_bot_token. #​5114
  • [ENHANCEMENT] docs: Add note about notifier timeouts. #​5077
  • [ENHANCEMENT] docs: Fix force_implicit_tls config field name. #​5030
  • [ENHANCEMENT] docs: Link community supported integrations. #​4978
  • [ENHANCEMENT] docs: Remove duplicate header. #​5034
  • [ENHANCEMENT] docs: Update mutual tls reference in high availability documentation. #​5120
  • [ENHANCEMENT] tracing: Use noop spans when tracing disabled. #​5118
  • [ENHANCEMENT] ui: Serve pre-compressed assets. #​5133
  • [FEATURE] Add silence annotations. #​4965
  • [FEATURE] Add silence logging option. #​4163
  • [FEATURE] Add support for multiple matcher set silences. #​4957
  • [FEATURE] Add the reason for notifying in dedup stage. #​4971
  • [FEATURE] mattermost: Flatten attachments into top-level config. #​5009
  • [FEATURE] mattermost: Support global webhook url. #​4998
  • [FEATURE] slack: Add default color from template. #​5014
  • [FEATURE] slack: Allow receiver to edit existing messages. #​5007
  • [FEATURE] template: Add dict, map and append functions. #​5093
  • [FEATURE] webhook: Add full payload templating support for notifier. #​5011
  • [BUGFIX] config: Check for empty cluster tls client config. #​5126
  • [BUGFIX] config: Don't crash upon reading empty config for notifier. #​4979
  • [BUGFIX] config: Fix ipv6 address handling in hostport.string(). #​5040
  • [BUGFIX] mattermost: Omit empty text field in notifications. #​4985
  • [BUGFIX] telegram: Send fallback message when notification exceeds character limit. #​5074
  • [BUGFIX] tracing: Properly shutdown tracer provider. #​5131
  • [BUGFIX] ui: Fix escaping for matcher values with quotes. #​4862
  • [BUGFIX] ui: Handle special chars in silence regex-matchers. #​4942
  • [BUGFIX] ui: Support utf-8 label names in matchers. #​5089

Configuration

📅 Schedule: (in timezone Europe/Berlin)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link
Copy Markdown

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 9, 2026

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/alertmanager:0.32.0

📦 Image Reference ghcr.io/uniget-org/tools/alertmanager:0.32.0
digestsha256:c88c909bc4779bb13ca90b7030af0de88e7ad0efc2b947d3db7c9ff7d5704a6d
vulnerabilitiescritical: 0 high: 1 medium: 2 low: 0
platformlinux/amd64
size35 MB
packages157
critical: 0 high: 1 medium: 0 low: 0 go.opentelemetry.io/otel/sdk 1.41.0 (golang)

pkg:golang/go.opentelemetry.io/otel/sdk@1.41.0

high 7.3: CVE--2026--39883 Untrusted Search Path

Affected range>=1.15.0
<=1.42.0
Fixed version1.43.0
CVSS Score7.3
CVSS VectorCVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Description

Summary

The fix for GHSA-9h8m-3fm2-qjrq (CVE-2026-24051) changed the Darwin ioreg command to use an absolute path but left the BSD kenv command using a bare name, allowing the same PATH hijacking attack on BSD and Solaris platforms.

Root Cause

sdk/resource/host_id.go line 42:

if result, err := r.execCommand("kenv", "-q", "smbios.system.uuid"); err == nil {

Compare with the fixed Darwin path at line 58:

result, err := r.execCommand("/usr/sbin/ioreg", "-rd1", "-c", "IOPlatformExpertDevice")

The execCommand helper at sdk/resource/host_id_exec.go uses exec.Command(name, arg...) which searches $PATH when the command name contains no path separator.

Affected platforms (per build tag in host_id_bsd.go:4): DragonFly BSD, FreeBSD, NetBSD, OpenBSD, Solaris.

The kenv path is reached when /etc/hostid does not exist (line 38-40), which is common on FreeBSD systems.

Attack

  1. Attacker has local access to a system running a Go application that imports go.opentelemetry.io/otel/sdk
  2. Attacker places a malicious kenv binary earlier in $PATH
  3. Application initializes OpenTelemetry resource detection at startup
  4. hostIDReaderBSD.read() calls exec.Command("kenv", ...) which resolves to the malicious binary
  5. Arbitrary code executes in the context of the application

Same attack vector and impact as CVE-2026-24051.

Suggested Fix

Use the absolute path:

if result, err := r.execCommand("/bin/kenv", "-q", "smbios.system.uuid"); err == nil {

On FreeBSD, kenv is located at /bin/kenv.

critical: 0 high: 0 medium: 1 low: 0 go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp 1.41.0 (golang)

pkg:golang/go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp@1.41.0

medium 5.3: CVE--2026--39882 Memory Allocation with Excessive Size Value

Affected range<1.43.0
Fixed version1.43.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

overview:
this report shows that the otlp HTTP exporters (traces/metrics/logs) read the full HTTP response body into an in-memory bytes.Buffer without a size cap.

this is exploitable for memory exhaustion when the configured collector endpoint is attacker-controlled (or a network attacker can mitm the exporter connection).

severity

HIGH

not claiming: this is a remote dos against every default deployment.
claiming: if the exporter sends traces to an untrusted collector endpoint (or over a network segment where mitm is realistic), that endpoint can crash the process via a large response body.

callsite (pinned):

  • exporters/otlp/otlptrace/otlptracehttp/client.go:199
  • exporters/otlp/otlptrace/otlptracehttp/client.go:230
  • exporters/otlp/otlpmetric/otlpmetrichttp/client.go:170
  • exporters/otlp/otlpmetric/otlpmetrichttp/client.go:201
  • exporters/otlp/otlplog/otlploghttp/client.go:190
  • exporters/otlp/otlplog/otlploghttp/client.go:221

permalinks (pinned):

root cause:
each exporter client reads resp.Body using io.Copy(&respData, resp.Body) into a bytes.Buffer on both success and error paths, with no upper bound.

impact:
a malicious collector can force large transient heap allocations during export (peak memory scales with attacker-chosen response size) and can potentially crash the instrumented process (oom).

affected component:

  • go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp
  • go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp
  • go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp

repro (local-only):

unzip poc.zip -d poc
cd poc
make canonical resp_bytes=33554432 chunk_delay_ms=0

expected output contains:

[CALLSITE_HIT]: otlptracehttp.UploadTraces::io.Copy(resp.Body)
[PROOF_MARKER]: resp_bytes=33554432 peak_alloc_bytes=118050512

control (same env, patched target):

unzip poc.zip -d poc
cd poc
make control resp_bytes=33554432 chunk_delay_ms=0

expected control output contains:

[CALLSITE_HIT]: otlptracehttp.UploadTraces::io.Copy(resp.Body)
[NC_MARKER]: resp_bytes=33554432 peak_alloc_bytes=512232

attachments: poc.zip (attached)

PR_DESCRIPTION.md

attack_scenario.md

poc.zip

Fixed in: open-telemetry/opentelemetry-go#8108

critical: 0 high: 0 medium: 1 low: 0 go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp 1.41.0 (golang)

pkg:golang/go.opentelemetry.io/otel/exporters@1.41.0#otlp/otlptrace/otlptracehttp

medium 5.3: CVE--2026--39882 Memory Allocation with Excessive Size Value

Affected range<1.43.0
Fixed version1.43.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

overview:
this report shows that the otlp HTTP exporters (traces/metrics/logs) read the full HTTP response body into an in-memory bytes.Buffer without a size cap.

this is exploitable for memory exhaustion when the configured collector endpoint is attacker-controlled (or a network attacker can mitm the exporter connection).

severity

HIGH

not claiming: this is a remote dos against every default deployment.
claiming: if the exporter sends traces to an untrusted collector endpoint (or over a network segment where mitm is realistic), that endpoint can crash the process via a large response body.

callsite (pinned):

  • exporters/otlp/otlptrace/otlptracehttp/client.go:199
  • exporters/otlp/otlptrace/otlptracehttp/client.go:230
  • exporters/otlp/otlpmetric/otlpmetrichttp/client.go:170
  • exporters/otlp/otlpmetric/otlpmetrichttp/client.go:201
  • exporters/otlp/otlplog/otlploghttp/client.go:190
  • exporters/otlp/otlplog/otlploghttp/client.go:221

permalinks (pinned):

root cause:
each exporter client reads resp.Body using io.Copy(&respData, resp.Body) into a bytes.Buffer on both success and error paths, with no upper bound.

impact:
a malicious collector can force large transient heap allocations during export (peak memory scales with attacker-chosen response size) and can potentially crash the instrumented process (oom).

affected component:

  • go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp
  • go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp
  • go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp

repro (local-only):

unzip poc.zip -d poc
cd poc
make canonical resp_bytes=33554432 chunk_delay_ms=0

expected output contains:

[CALLSITE_HIT]: otlptracehttp.UploadTraces::io.Copy(resp.Body)
[PROOF_MARKER]: resp_bytes=33554432 peak_alloc_bytes=118050512

control (same env, patched target):

unzip poc.zip -d poc
cd poc
make control resp_bytes=33554432 chunk_delay_ms=0

expected control output contains:

[CALLSITE_HIT]: otlptracehttp.UploadTraces::io.Copy(resp.Body)
[NC_MARKER]: resp_bytes=33554432 peak_alloc_bytes=512232

attachments: poc.zip (attached)

PR_DESCRIPTION.md

attack_scenario.md

poc.zip

Fixed in: open-telemetry/opentelemetry-go#8108

@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 9, 2026

@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 9, 2026

@github-actions github-actions bot merged commit bdabe75 into main Apr 9, 2026
9 of 11 checks passed
@github-actions github-actions bot deleted the renovate/alertmanager-0.x branch April 9, 2026 03:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants