Skip to content

fix(cve): CVE-2026-24051 - bump go.opentelemetry.io/otel to v1.40.0 [release-v0.42.2]#2870

Open
divyansh42 wants to merge 1 commit into
release-v0.42.2from
fix/cve-2026-24051-otel-sdk-resource-release-v0.42.2-attempt-1
Open

fix(cve): CVE-2026-24051 - bump go.opentelemetry.io/otel to v1.40.0 [release-v0.42.2]#2870
divyansh42 wants to merge 1 commit into
release-v0.42.2from
fix/cve-2026-24051-otel-sdk-resource-release-v0.42.2-attempt-1

Conversation

@divyansh42
Copy link
Copy Markdown
Member

CVE Details

Field Value
CVE ID CVE-2026-24051
GHSA GHSA-9h8m-3fm2-qjrq
Severity HIGH
CVSS Score 7.3
Affected Package go.opentelemetry.io/otel/sdk/resource
Vulnerable Range >= 1.21.0, <= 1.39.0
Fix Version 1.40.0

Fix Summary

Bumps all go.opentelemetry.io/otel packages from v1.39.0v1.40.0:

  • go.opentelemetry.io/otel
  • go.opentelemetry.io/otel/metric
  • go.opentelemetry.io/otel/sdk
  • go.opentelemetry.io/otel/sdk/metric
  • go.opentelemetry.io/otel/trace

The vulnerability (GHSA-9h8m-3fm2-qjrq) allows Arbitrary Code Execution via local PATH Hijacking on macOS/Darwin through kenv in otel/sdk/resource. v1.40.0 is the minimum patched version.

Test Results

⚠️ No automated tests run — dependency bump only. Manual verification recommended.

Breaking Changes

None expected. v1.40.0 is a minor version bump with backwards-compatible API changes.

Risk Assessment

Low — indirect dependency upgrade within the same major version. The vulnerability is OS-specific (macOS/Darwin) and exploitable only via local PATH manipulation.

Jira References

SRVKP-10615

Verification Steps

  • Confirm go.opentelemetry.io/otel packages are at v1.40.0 in go.mod
  • Run go mod verify to confirm all modules verified
  • Confirm no build failures

🤖 Generated with Claude Code via Ambient CVE Fixer

@tekton-robot tekton-robot added do-not-merge/release-note-label-needed Indicates that a PR should not merge because it's missing one of the release note labels. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels May 17, 2026
@linux-foundation-easycla
Copy link
Copy Markdown

linux-foundation-easycla Bot commented May 18, 2026

CLA Signed
The committers listed above are authorized under a signed CLA.

  • ✅ login: divyansh42 / name: divyansh42 (c205dfb)

@tekton-robot tekton-robot added size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. and removed size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels May 18, 2026
@divyansh42 divyansh42 force-pushed the fix/cve-2026-24051-otel-sdk-resource-release-v0.42.2-attempt-1 branch from 9589246 to c36749a Compare May 18, 2026 05:09
@divyansh42
Copy link
Copy Markdown
Member Author

/retest

@divyansh42 divyansh42 force-pushed the fix/cve-2026-24051-otel-sdk-resource-release-v0.42.2-attempt-1 branch 2 times, most recently from d4dd0a7 to 9b5d81b Compare May 19, 2026 19:46
@divyansh42
Copy link
Copy Markdown
Member Author

/release-note-none

@tekton-robot tekton-robot added release-note-none Denotes a PR that doesnt merit a release note. and removed do-not-merge/release-note-label-needed Indicates that a PR should not merge because it's missing one of the release note labels. labels May 19, 2026
…release-v0.42.2]

Bumps go.opentelemetry.io/otel from v1.39.0 to v1.40.0 to address
CVE-2026-24051 (GHSA-9h8m-3fm2-qjrq) — PATH hijacking via SDK resource
detection on Windows.

Also runs go mod vendor to sync vendor/modules.txt so CI's vendor-aware
build mode passes.

Jira: SRVKP-12038
Co-Authored-By: Claude Sonnet 4.6 <[email protected]>
Signed-off-by: divyansh42 <[email protected]>
@divyansh42 divyansh42 force-pushed the fix/cve-2026-24051-otel-sdk-resource-release-v0.42.2-attempt-1 branch from 9b5d81b to c205dfb Compare May 20, 2026 03:59
@divyansh42
Copy link
Copy Markdown
Member Author

/retest

@pratap0007
Copy link
Copy Markdown
Contributor

/approve
/lgtm

@tekton-robot tekton-robot added the lgtm Indicates that a PR is ready to be merged. label May 20, 2026
@tekton-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: pratap0007
To complete the pull request process, please assign vdemeester after the PR has been reviewed.
You can assign the PR to them by writing /assign @vdemeester in a comment when ready.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

lgtm Indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesnt merit a release note. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants