fix(cve): CVE-2026-24051 - bump go.opentelemetry.io/otel to v1.40.0 [release-v0.43.1]#2871
Conversation
|
@divyansh42: Adding the "do-not-merge/release-note-label-needed" label because no release-note block was detected, please follow our release note process to remove it. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
/retest |
|
…release-v0.43.1] Bumps go.opentelemetry.io/otel from v1.39.0 to v1.40.0 to address CVE-2026-24051 (GHSA-9h8m-3fm2-qjrq) — PATH hijacking via SDK resource detection on Windows. Also runs go mod vendor to sync vendor/modules.txt so CI's vendor-aware build mode passes. Jira: SRVKP-12038 Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
ce725da to
cb8ea73
Compare
CVE Details
go.opentelemetry.io/otel/sdk/resourceFix Summary
Bumps all
go.opentelemetry.io/otelpackages from v1.39.0 → v1.40.0:go.opentelemetry.io/otelgo.opentelemetry.io/otel/metricgo.opentelemetry.io/otel/sdkgo.opentelemetry.io/otel/sdk/metricgo.opentelemetry.io/otel/traceThe vulnerability (GHSA-9h8m-3fm2-qjrq) allows Arbitrary Code Execution via local PATH Hijacking on macOS/Darwin through
kenvinotel/sdk/resource. v1.40.0 is the minimum patched version.Test Results
Breaking Changes
None expected. v1.40.0 is a minor version bump with backwards-compatible API changes.
Risk Assessment
Low — indirect dependency upgrade within the same major version. The vulnerability is OS-specific (macOS/Darwin) and exploitable only via local PATH manipulation.
Jira References
SRVKP-10615
Verification Steps
go.opentelemetry.io/otelpackages are at v1.40.0 in go.modgo mod verifyto confirm all modules verified🤖 Generated with Claude Code via Ambient CVE Fixer