You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We updated all dependency packages to latest versions to fix reported security vulnerabilities.
What's Changed
Fix: For workflow_run events, resolve the commit of the check run from related pull request head commits first (matching workflow_run.head_branch, then first PR), and fall back to workflow_run.head_sha for non-PR runs #673
Change: The test-reporter action will listed all artifacts associated with the build run #693
When exporting telemetry over gRPC using the OpenTelemetry Protocol (OTLP), the exporter may parse a server-provided grpc-status-details-bin trailer during retry handling. Prior to the fix, a malformed trailer could encode an extremely large length-delimited protobuf field which was used directly for allocation, allowing excessive memory allocation and potential denial of service (DoS).
Details
#5980 introduced a retry path that parses grpc-status-details-bin to extract gRPC retry delay information for retryable responses.
On that path:
OtlpGrpcExportClient captures grpc-status-details-bin from retryable status responses (ResourceExhausted / Unavailable).
OtlpRetry invokes GrpcStatusDeserializer.TryGetGrpcRetryDelay using this untrusted trailer value.
GrpcStatusDeserializer.DecodeBytes decoded a protobuf varint length and allocated new byte[length] without validating the bounds against the remaining payload size.
A malicious or compromised collector (or a MitM in weakly-protected deployments) could return a crafted grpc-status-details-bin payload that forces oversized allocation and memory exhaustion in the instrumented process.
Impact
If an OTLP/gRPC endpoint is attacker-controlled (or traffic is intercepted), a crafted retryable response can trigger large allocations during trailer parsing, which may exhaust memory and cause process instability/crash (availability impact / DoS).
Mitigation
The application's configured back-end/collector endpoint needs to behave maliciously. If the collector/back-end is a well-behaved implementation response bodies should not be excessively large if a request error occurs.
Workarounds
None known.
Remediation
#7064 updates GrpcStatusDeserializer to validate decoded length-delimited field sizes before allocation by ensuring the requested length is sane and does not exceed the remaining payload.
This causes malformed or truncated grpc-status-details-bin payloads to fail safely instead of attempting unbounded allocation.
Memory Allocation with Excessive Size Value
Affected range
>=1.13.1 <1.15.2
Fixed version
1.15.2
CVSS Score
5.3
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score
0.015%
EPSS Percentile
3rd percentile
Description
Summary
When exporting telemetry to a back-end/collector over gRPC or HTTP using OpenTelemetry Protocol format (OTLP), if the request results in a unsuccessful request (i.e. HTTP 4xx or 5xx), the response is read into memory with no upper-bound on the number of bytes consumed.
This could cause memory exhaustion in the consuming application if the configured back-end/collector endpoint is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned by the response.
Details
open-telemetry/opentelemetry-dotnet#6564 introduced a change to read the response body when a non-200 HTTP status code is received when exporting telemetry to aid debugging by operators so that the error response is included in the logs emitted by the exporter for both gRPC and HTTP/protobuf.
This vulnerability was surfaced during the investigation of GHSA-w8rr-5gcm-pp58.
Impact
If an application using the OTLP exporter is configured to use a back-end/collector endpoint that is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned by the response the application could have its memory exhausted and create a denial-of-service condition.
Mitigation
The application's configured back-end/collector endpoint needs to behave maliciously. If the collector/back-end is a well-behaved implementation response bodies should not be excessively large if a request error occurs.
Workarounds
None known.
Remediation
#7017 updates the OTLP exporter for both gRPC and HTTP to:
The implementation details of the baggage, B3 and Jaeger processing code in the OpenTelemetry.Api and OpenTelemetry.Extensions.Propagators NuGet packages can allocate excessive memory when parsing which could create a potential denial of service (DoS) in the consuming application.
Details
Exceeding Limits
BaggagePropagator.Inject<T>() does not enforce the length limit of 8192 characters if the injected baggage contains only one item.
Excessively large propagation headers, particularly in degenerate/malformed cases that consist or large numbers of delimiter characters, can allocate excessive amounts of memory for intermediate storage of parsed content relative to the size of the original input.
Mitigation
HTTP servers often set maximum limits on the length of HTTP request headers, such as Internet Information Services (IIS) which sets a default limit of 16KB and nginx which sets a default limit of 8KB.
#7061 refactors the handling of baggage, B3 and Jaeger propagation headers to stop parsing eagerly when limits are exceeded and avoid allocating intermediate arrays.
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to cede0bb
chore(deps): update taiki-e/install-action digest to 70e0055
Feb 18, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 70e0055
chore(deps): update taiki-e/install-action digest to 1cf3de8
Feb 19, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 1cf3de8
chore(deps): update taiki-e/install-action digest to 2723513
Feb 20, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 2723513
chore(deps): update taiki-e/install-action digest to 71b4839
Feb 20, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 71b4839
chore(deps): update taiki-e/install-action digest to 470679b
Feb 21, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 470679b
chore(deps): update taiki-e/install-action digest to f92912f
Feb 22, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to f92912f
chore(deps): update taiki-e/install-action digest to cfdb446
Feb 23, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to cfdb446
chore(deps): update taiki-e/install-action digest to 7f491e2
Feb 24, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 7f491e2
chore(deps): update taiki-e/install-action digest to 305beba
Feb 25, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 305beba
chore(deps): update taiki-e/install-action digest to d9c7e4d
Feb 26, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to d9c7e4d
chore(deps): update taiki-e/install-action digest to aba36d7
Feb 26, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to aba36d7
chore(deps): update taiki-e/install-action digest to a3324fb
Feb 27, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to a3324fb
chore(deps): update taiki-e/install-action digest to 2dc1234
Feb 28, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 2dc1234
chore(deps): update taiki-e/install-action digest to 68675c5
Feb 28, 2026
renovateBot
changed the title
chore(deps): update taiki-e/install-action digest to 68675c5
chore(deps): update taiki-e/install-action digest to d6e286f
Mar 2, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
cdf6c1f→27d5ce7baa11fb→c2fa09f8df5847→ec611892.8.6→2.8.7f8c7768→bacf4623eeb9fcv2.5.0→v2.7.0f8d25fb→cf525cbWarning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
codacy/git-version (codacy/git-version)
v2.8.7Compare Source
dorny/test-reporter (dorny/test-reporter)
v2.7.0Compare Source
What's Changed
slug-prefixoutput for link anchors #731jest-junittestsuite errors as failures #155Other Changes
flattedpackage to v3.4.1 to fix a vulnerability by @jozefizso in #739New Contributors
Full Changelog: dorny/test-reporter@v2.6.0...v2.7.0
v2.6.0Compare Source
We updated all dependency packages to latest versions to fix reported security vulnerabilities.
What's Changed
workflow_runevents, resolve the commit of the check run from related pull request head commits first (matchingworkflow_run.head_branch, then first PR), and fall back toworkflow_run.head_shafor non-PR runs #673test-reporteraction will listed all artifacts associated with the build run #693New Contributors
Full Changelog: dorny/test-reporter@v2.5.0...v2.6.0
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.