Skip to content

chore(deps): update github actions#1157

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/github-actions
Open

chore(deps): update github actions#1157
renovate[bot] wants to merge 1 commit intomainfrom
renovate/github-actions

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Feb 17, 2026

This PR contains the following updates:

Package Type Update Change
actions/cache (changelog) action digest cdf6c1f27d5ce7
actions/setup-dotnet (changelog) action digest baa11fbc2fa09f
aws-actions/configure-aws-credentials (changelog) action digest 8df5847ec61189
codacy/git-version action patch 2.8.62.8.7
docker/scout-action (changelog) action digest f8c7768bacf462
dorny/test-reporter action pinDigest 3eeb9fc
dorny/test-reporter action minor v2.5.0v2.7.0
taiki-e/install-action (changelog) action digest f8d25fbcf525cb

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

codacy/git-version (codacy/git-version)

v2.8.7

Compare Source

dorny/test-reporter (dorny/test-reporter)

v2.7.0

Compare Source

What's Changed
  • Feature: Add slug-prefix output for link anchors #​731
  • Feature: Report jest-junit testsuite errors as failures #​155
  • Security: Update dependencies to fix reported security vulnerabilities
Other Changes
New Contributors

Full Changelog: dorny/test-reporter@v2.6.0...v2.7.0

v2.6.0

Compare Source

We updated all dependency packages to latest versions to fix reported security vulnerabilities.

What's Changed
  • Fix: For workflow_run events, resolve the commit of the check run from related pull request head commits first (matching workflow_run.head_branch, then first PR), and fall back to workflow_run.head_sha for non-PR runs #​673
  • Change: The test-reporter action will listed all artifacts associated with the build run #​693
  • Maintenance: Upgrade to ESLint v9 #​629
New Contributors

Full Changelog: dorny/test-reporter@v2.5.0...v2.6.0


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Feb 17, 2026

🔍 Vulnerabilities of dockerhubaneo/armonik_control:0.38.1-renovategithubactions.7.sha.b463691f

📦 Image Reference dockerhubaneo/armonik_control:0.38.1-renovategithubactions.7.sha.b463691f
digestsha256:4763f87211779e47f6413c46be41088bd6d0412ba10220311e0305428399fb0a
vulnerabilitiescritical: 0 high: 0 medium: 3 low: 0
platformlinux/amd64
size74 MB
packages121
critical: 0 high: 0 medium: 2 low: 0 OpenTelemetry.Exporter.OpenTelemetryProtocol 1.15.0 (nuget)

pkg:nuget/OpenTelemetry.Exporter.OpenTelemetryProtocol@1.15.0

# Dockerfile (175:175)
COPY --from=build /app/publish/submitter .

medium 5.3: CVE--2026--40891 Memory Allocation with Excessive Size Value

Affected range>=1.13.1
<1.15.3
Fixed version1.15.3
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.014%
EPSS Percentile3rd percentile
Description

Summary

When exporting telemetry over gRPC using the OpenTelemetry Protocol (OTLP), the exporter may parse a server-provided grpc-status-details-bin trailer during retry handling. Prior to the fix, a malformed trailer could encode an extremely large length-delimited protobuf field which was used directly for allocation, allowing excessive memory allocation and potential denial of service (DoS).

Details

#5980 introduced a retry path that parses grpc-status-details-bin to extract gRPC retry delay information for retryable responses.

On that path:

  • OtlpGrpcExportClient captures grpc-status-details-bin from retryable status responses (ResourceExhausted / Unavailable).
  • OtlpRetry invokes GrpcStatusDeserializer.TryGetGrpcRetryDelay using this untrusted trailer value.
  • GrpcStatusDeserializer.DecodeBytes decoded a protobuf varint length and allocated new byte[length] without validating the bounds against the remaining payload size.

A malicious or compromised collector (or a MitM in weakly-protected deployments) could return a crafted grpc-status-details-bin payload that forces oversized allocation and memory exhaustion in the instrumented process.

Impact

If an OTLP/gRPC endpoint is attacker-controlled (or traffic is intercepted), a crafted retryable response can trigger large allocations during trailer parsing, which may exhaust memory and cause process instability/crash (availability impact / DoS).

Mitigation

The application's configured back-end/collector endpoint needs to behave maliciously. If the collector/back-end is a well-behaved implementation response bodies should not be excessively large if a request error occurs.

Workarounds

None known.

Remediation

#7064 updates GrpcStatusDeserializer to validate decoded length-delimited field sizes before allocation by ensuring the requested length is sane and does not exceed the remaining payload.

This causes malformed or truncated grpc-status-details-bin payloads to fail safely instead of attempting unbounded allocation.

medium 5.3: CVE--2026--40182 Memory Allocation with Excessive Size Value

Affected range>=1.13.1
<1.15.2
Fixed version1.15.2
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.015%
EPSS Percentile3rd percentile
Description

Summary

When exporting telemetry to a back-end/collector over gRPC or HTTP using OpenTelemetry Protocol format (OTLP), if the request results in a unsuccessful request (i.e. HTTP 4xx or 5xx), the response is read into memory with no upper-bound on the number of bytes consumed.

This could cause memory exhaustion in the consuming application if the configured back-end/collector endpoint is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned by the response.

Details

open-telemetry/opentelemetry-dotnet#6564 introduced a change to read the response body when a non-200 HTTP status code is received when exporting telemetry to aid debugging by operators so that the error response is included in the logs emitted by the exporter for both gRPC and HTTP/protobuf.

An unintended consequence of this change is that the response body is fully read into memory when received with no upper-bound.

This vulnerability was surfaced during the investigation of GHSA-w8rr-5gcm-pp58.

Impact

If an application using the OTLP exporter is configured to use a back-end/collector endpoint that is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned by the response the application could have its memory exhausted and create a denial-of-service condition.

Mitigation

The application's configured back-end/collector endpoint needs to behave maliciously. If the collector/back-end is a well-behaved implementation response bodies should not be excessively large if a request error occurs.

Workarounds

None known.

Remediation

#7017 updates the OTLP exporter for both gRPC and HTTP to:

critical: 0 high: 0 medium: 1 low: 0 OpenTelemetry.Api 1.15.0 (nuget)

pkg:nuget/OpenTelemetry.Api@1.15.0

# Dockerfile (175:175)
COPY --from=build /app/publish/submitter .

medium 5.3: CVE--2026--40894 Memory Allocation with Excessive Size Value

Affected range>=0.5.0-beta.2
<1.15.3
Fixed version1.15.3
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS Score0.021%
EPSS Percentile6th percentile
Description

Summary

The implementation details of the baggage, B3 and Jaeger processing code in the OpenTelemetry.Api and OpenTelemetry.Extensions.Propagators NuGet packages can allocate excessive memory when parsing which could create a potential denial of service (DoS) in the consuming application.

Details

Exceeding Limits

BaggagePropagator.Inject<T>() does not enforce the length limit of 8192 characters if the injected baggage contains only one item.

This change was introduced by #1048.

Excessive allocation

The following methods eagerly allocate intermediate arrays before applying size limits.

Impact

Excessively large propagation headers, particularly in degenerate/malformed cases that consist or large numbers of delimiter characters, can allocate excessive amounts of memory for intermediate storage of parsed content relative to the size of the original input.

Mitigation

HTTP servers often set maximum limits on the length of HTTP request headers, such as Internet Information Services (IIS) which sets a default limit of 16KB and nginx which sets a default limit of 8KB.

Workarounds

Possible workarounds include:

  • Configuring appropriate HTTP request header limits.
  • Disabling baggage and/or trace propagation.

Remediation

#7061 refactors the handling of baggage, B3 and Jaeger propagation headers to stop parsing eagerly when limits are exceeded and avoid allocating intermediate arrays.

@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to cede0bb chore(deps): update taiki-e/install-action digest to 70e0055 Feb 18, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from e491dcb to df4260a Compare February 18, 2026 13:44
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 70e0055 chore(deps): update taiki-e/install-action digest to 1cf3de8 Feb 19, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch 2 times, most recently from 04909d3 to ccaedb9 Compare February 20, 2026 05:03
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 1cf3de8 chore(deps): update taiki-e/install-action digest to 2723513 Feb 20, 2026
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 2723513 chore(deps): update taiki-e/install-action digest to 71b4839 Feb 20, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch 2 times, most recently from 31a6a40 to 2451fc2 Compare February 21, 2026 04:28
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 71b4839 chore(deps): update taiki-e/install-action digest to 470679b Feb 21, 2026
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 470679b chore(deps): update taiki-e/install-action digest to f92912f Feb 22, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from 2451fc2 to e0af524 Compare February 22, 2026 04:56
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to f92912f chore(deps): update taiki-e/install-action digest to cfdb446 Feb 23, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from e0af524 to 5810ba2 Compare February 23, 2026 04:51
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to cfdb446 chore(deps): update taiki-e/install-action digest to 7f491e2 Feb 24, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from 5810ba2 to d31a940 Compare February 24, 2026 21:57
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 7f491e2 chore(deps): update taiki-e/install-action digest to 305beba Feb 25, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from d31a940 to 8db9882 Compare February 25, 2026 19:01
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 305beba chore(deps): update taiki-e/install-action digest to d9c7e4d Feb 26, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from 8db9882 to dac4928 Compare February 26, 2026 02:01
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to d9c7e4d chore(deps): update taiki-e/install-action digest to aba36d7 Feb 26, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from dac4928 to a689ee1 Compare February 26, 2026 20:41
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to aba36d7 chore(deps): update taiki-e/install-action digest to a3324fb Feb 27, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from a689ee1 to b76b19d Compare February 27, 2026 14:47
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to a3324fb chore(deps): update taiki-e/install-action digest to 2dc1234 Feb 28, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from b76b19d to 550d255 Compare February 28, 2026 05:58
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 2dc1234 chore(deps): update taiki-e/install-action digest to 68675c5 Feb 28, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch from 550d255 to 34ac8f4 Compare February 28, 2026 16:42
@renovate renovate Bot changed the title chore(deps): update taiki-e/install-action digest to 68675c5 chore(deps): update taiki-e/install-action digest to d6e286f Mar 2, 2026
@renovate renovate Bot force-pushed the renovate/github-actions branch 6 times, most recently from 8e04f92 to 263d609 Compare March 15, 2026 17:40
@renovate renovate Bot force-pushed the renovate/github-actions branch 13 times, most recently from 0097d7e to ee213a2 Compare March 21, 2026 20:49
@renovate renovate Bot force-pushed the renovate/github-actions branch 9 times, most recently from ba7f7db to 666852a Compare March 27, 2026 18:51
@sonarqubecloud
Copy link
Copy Markdown

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants