Skip to content

chore(deps): update gcx to v0.2.14#21731

Merged
github-actions[bot] merged 1 commit into
mainfrom
renovate/gcx-0.2.x
May 11, 2026
Merged

chore(deps): update gcx to v0.2.14#21731
github-actions[bot] merged 1 commit into
mainfrom
renovate/gcx-0.2.x

Conversation

@uniget-bot
Copy link
Copy Markdown

This PR contains the following updates:

Package Update Change
gcx patch 0.2.130.2.14

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

grafana/gcx (gcx)

v0.2.14

Compare Source

  • New: Instrumentation Hub provider package with full CRUD, RMW, and
    Helm formatter support
  • New: Alert provisioning CRUD — contact-points, mute-timings,
    notification-policies, and templates
  • New: AI Observability saved-conversations and collections commands
  • New: gcx version structured subcommand with machine-readable output
  • New: gcx assistant dashboard subcommand; fix --agent-id flag
  • New: Login accepts --org-id to configure organization ID
  • Knowledge Graph entities list now supports pagination
  • Knowledge Graph inspect drops hardcoded filters for raw, agent-friendly output
  • Agents codec with temp-file spill for token-efficient agent output
  • Log failed agent invocations to disk for capability-gap analysis
  • Fix exit codes: usage errors emit 2, partial failures emit 4
  • stacks delete: rename --yes to --force; respect agent mode
  • Migrate all provider delete commands to consistent ConfirmDestructive
  • Fix non-interactive confirmation bypass for metrics adaptive and alert
  • Config check now classifies .grafana.com hosts and stack-id as Cloud
  • Login now suggests running config check after successful login
  • Fix IRM incident URL template to use correct OnCall plugin slug
  • Dev import: register v1 converters for Folder and Dashboard resources

Configuration

📅 Schedule: (in timezone Europe/Berlin)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate.

Copy link
Copy Markdown

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 9, 2026

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/gcx:0.2.14

📦 Image Reference ghcr.io/uniget-org/tools/gcx:0.2.14
digestsha256:57323f230309f4807094874cbbc7bd2488c07866b29c6e8911cf8b16497accae
vulnerabilitiescritical: 0 high: 7 medium: 6 low: 0
platformlinux/amd64
size32 MB
packages353
critical: 0 high: 5 medium: 3 low: 0 stdlib 1.26.2 (golang)

pkg:golang/stdlib@1.26.2

high : CVE--2026--42499

Affected range>=1.26.0-0
<1.26.3
Fixed version1.26.3
EPSS Score0.008%
EPSS Percentile1st percentile
Description

Pathological inputs could cause DoS through consumePhrase when parsing an email address according to RFC 5322.

high : CVE--2026--39836

Affected range>=1.26.0-0
<1.26.3
Fixed version1.26.3
EPSS Score0.007%
EPSS Percentile1st percentile
Description

The Dial and LookupPort functions panic on Windows when provided with an input containing a NUL (0).

high : CVE--2026--39820

Affected range>=1.26.0-0
<1.26.3
Fixed version1.26.3
EPSS Score0.018%
EPSS Percentile5th percentile
Description

Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.

high : CVE--2026--33814

Affected range>=1.26.0-0
<1.26.3
Fixed version1.26.3
EPSS Score0.008%
EPSS Percentile1st percentile
Description

When processing HTTP/2 SETTINGS frames, transport will enter an infinite loop of writing CONTINUATION frames if it receives a SETTINGS_MAX_FRAME_SIZE with a value of 0.

high : CVE--2026--33811

Affected range>=1.26.0-0
<1.26.3
Fixed version1.26.3
EPSS Score0.007%
EPSS Percentile1st percentile
Description

When using LookupCNAME with the cgo DNS resolver, a very long CNAME response can trigger a double-free of C memory and a crash.

medium : CVE--2026--39826

Affected range>=1.26.0-0
<1.26.3
Fixed version1.26.3
EPSS Score0.012%
EPSS Percentile2nd percentile
Description

If a trusted template author were to write a <script> tag containing an empty 'type' attribute or a 'type' attribute with an ASCII whitespace, the execution of the template would incorrectly escape any data passed into the <script> block.

medium : CVE--2026--39823

Affected range>=1.26.0-0
<1.26.3
Fixed version1.26.3
EPSS Score0.011%
EPSS Percentile1st percentile
Description

CVE-2026-27142 fixed a vulnerability in which URLs were not correctly escaped inside of a tag's attribute. If the URL content were to insert ASCII whitespaces around the '=' rune inside of the attribute, the escaper would fail to similarly escape it, leading to XSS.

medium : CVE--2026--39825

Affected range>=1.26.0-0
<1.26.3
Fixed version1.26.3
EPSS Score0.007%
EPSS Percentile1st percentile
Description

ReverseProxy can forward queries containing parameters not visible to Rewrite functions.

When used with a Rewrite function, or a Director function which parses query parameters, ReverseProxy sanitizes the forwarded request to remove query parameters which are not parsed by url.ParseQuery. ReverseProxy does not take ParseQuery's limit on the total number of query parameters (controlled by GODEBUG=urlmaxqueryparams=N) into account. This can permit ReverseProxy to forward a request containing a query parameter that is not visible to the Rewrite function.

For example, the query "a1=x&a2=x&...&a10000=x&hidden=y" can forward the parameter "hidden=y" while hiding it from the proxy's Rewrite function.

critical: 0 high: 2 medium: 2 low: 0 github.com/prometheus/prometheus 0.55.0 (golang)

pkg:golang/github.com/prometheus/prometheus@0.55.0

high 7.5: CVE--2026--42154 Uncontrolled Resource Consumption

Affected range<0.311.3
Fixed version0.311.3
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.021%
EPSS Percentile6th percentile
Description

Impact

The remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory.
An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process.

Patches

Has the problem been patched? What versions should users upgrade to?

Fixed in 3.11.3 and 3.5.3 LTS. Users should upgrade to these versions or later.

Workarounds

User who can not upgrade can place Prometheus behind a reverse proxy or firewall that requires authentication before requests reach /api/v1/read.

high 7.5: CVE--2026--42151 Exposure of Sensitive Information to an Unauthorized Actor

Affected range>=0.45.2
<0.311.3
Fixed version0.311.3
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score0.010%
EPSS Percentile1st percentile
Description

Impact

Users who use Azure AD remote write with OAuth authentication are impacted.

The client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint.

Patches

The problem has been patched by changing ClientSecret in OAuthConfig to Secret. Users should upgrade to 3.11.3 or 3.5.3 LTS.

Workarounds

Users who can not upgrade can switch to Managed Identity or Workload Identity authentication for Azure AD remote write, which do not involve a client secret.

medium 5.3: CVE--2026--40179 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Affected range<0.311.2-0.20260410083055-07c6232d159b
Fixed version0.311.2-0.20260410083055-07c6232d159b
CVSS Score5.3
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS Score0.011%
EPSS Percentile2nd percentile
Description

Impact

Stored cross-site scripting (XSS) via crafted metric names in the Prometheus web UI:

  • Old React UI + New Mantine UI: When a user hovers over a chart tooltip on the Graph page, metric names containing HTML/JavaScript are injected into innerHTML without escaping, causing arbitrary script execution in the user's browser.
  • Old React UI only: When a user opens the Metric Explorer (globe icon next to the PromQL expression input field), and a metric name containing HTML/JavaScript is rendered in the fuzzy search results, it is injected into innerHTML without escaping, causing arbitrary script execution in the user's browser.
  • Old React UI only: When a user views a heatmap chart and hovers over a cell, the le label values of the underlying histogram buckets are interpolated into innerHTML without escaping. While le is conventionally a numeric bucket boundary, Prometheus does not enforce this — arbitrary UTF-8 strings are accepted as label values, allowing script injection via a crafted scrape target or remote write.

With Prometheus v3.x defaulting to UTF-8 metric and label name validation, characters like <, >, and " are now valid in metric names and labels, making this exploitable.

An attacker who can inject metrics (via a compromised scrape target, remote write, or OTLP receiver endpoint) can execute JavaScript in the browser of any Prometheus user who views the metric in the Graph UI. From the XSS context, an attacker could for example:

  • Read /api/v1/status/config to extract sensitive configuration (although credentials / secrets are redacted by the server)
  • Call /-/quit to shut down Prometheus (only if --web.enable-lifecycle is set)
  • Call /api/v1/admin/tsdb/delete_series to delete data (only if --web.enable-admin-api is set)
  • Exfiltrate metric data to an external server

Both the new Mantine UI and the old React UI are affected. The vulnerable code paths are:

  • web/ui/mantine-ui/src/pages/query/uPlotChartHelpers.ts — tooltip innerHTML with unescaped labels.__name__
  • web/ui/react-app/src/pages/graph/GraphHelpers.ts — tooltip content with unescaped labels.__name__
  • web/ui/react-app/src/pages/graph/MetricsExplorer.tsx — fuzzy search results rendered via dangerouslySetInnerHTML without sanitization
  • web/ui/react-app/src/vendor/flot/jquery.flot.heatmap.js — heatmap tooltip with unescaped label values

Patches

A patch has been published in Prometheus 3.5.2 LTS and Prometheus 3.11.2. The fix applies escapeHTML() to all user-controlled values (metric names and label values) before inserting them into innerHTML. This advisory will be updated with the patched version once released.

Workarounds

  • If using the remote write receiver (--web.enable-remote-write-receiver), ensure it is not exposed to untrusted sources.
  • If using the OTLP receiver (--web.enable-otlp-receiver), ensure it is not exposed to untrusted sources.
  • Ensure scrape targets are trusted and not under attacker control.
  • Do not enable admin / mutating API endpoints (e.g. --web.enable-admin-api or web.enable-lifecycle) in cases where you cannot prevent untrusted data from being ingested.
  • Users should avoid clicking untrusted links, especially those containing functions such as label_replace, as they may generate poisoned label names and values.

Acknowledgements

Thanks to @gladiator9797 (Duc Anh Nguyen from TinyxLab) for reporting this.

medium : GHSA--fw8g--cg8f--9j28 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Affected range<0.311.3
Fixed version0.311.3
Description

Impact

In the Prometheus server's legacy web UI (enabled via the command-line flag --enable-feature=old-ui), the histogram heatmap chart view does not escape le label values when inserting them into the HTML for use as axis tick mark labels.

An attacker who can inject crafted metrics (e.g. via a compromised scrape target, remote write, or OTLP receiver endpoint) can execute JavaScript in the browser of any Prometheus user who views the metric in the heatmap chart UI. From the XSS context, an attacker could for example:

  • Read /api/v1/status/config to extract sensitive configuration (although credentials / secrets are redacted by the server)
  • Call /-/quit to shut down Prometheus (only if --web.enable-lifecycle is set)
  • Call /api/v1/admin/tsdb/delete_series to delete data (only if --web.enable-admin-api is set)
  • Exfiltrate metric data to an external server

Note that this only affects users who have explicitly enabled the legacy Prometheus web UI using the --enable-feature=old-ui command-line flag.

Patches

prometheus/prometheus@38f23b9

Workarounds

If at all possible, disable the legacy web UI by removing the --enable-feature=old-ui command-line flag).

If this is not an option, take the following precautions:

  • If using the remote write receiver (--web.enable-remote-write-receiver), ensure it is not exposed to untrusted sources.
  • If using the OTLP receiver (--web.enable-otlp-receiver), ensure it is not exposed to untrusted sources.
  • Ensure scrape targets are trusted and not under attacker control.
  • Do not enable admin / mutating API endpoints (e.g. --web.enable-admin-api or web.enable-lifecycle) in cases where you cannot prevent untrusted data from being ingested.
  • Users should avoid clicking untrusted links, especially those containing functions such as label_replace, as they may generate poisoned label names and values.

References

  • CVE-2019-10215 — prior stored DOM XSS vulnerability in Prometheus query history, fixed in v2.7.2
  • CVE-2026-40179 — prior stored DOM XSS vulnerability in Prometheus web UI (hover tooltips and metrics explorer), fixed in v3.11.2
critical: 0 high: 0 medium: 1 low: 0 github.com/grafana/loki/v3 3.4.2 (golang)

pkg:golang/github.com/grafana/loki@3.4.2#v3

medium 5.3: CVE--2026--21726 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Affected range<3.6.4
Fixed version3.6.4
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score0.015%
EPSS Percentile3rd percentile
Description

The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a single URL decode, by double encoding, an attacker can read files at the Ruler API endpoint /loki/api/v1/rules/{namespace}

Thanks to Prasanth Sundararajan for reporting this vulnerability.

@uniget-bot uniget-bot force-pushed the renovate/gcx-0.2.x branch from e1fb054 to 63b6519 Compare May 11, 2026 08:25
@github-actions
Copy link
Copy Markdown

Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/25659323863.

@github-actions
Copy link
Copy Markdown

PR is clean and can be merged. See https://github.com/uniget-org/tools/actions/runs/25659323863.

@github-actions github-actions Bot merged commit d35113a into main May 11, 2026
9 checks passed
@github-actions github-actions Bot deleted the renovate/gcx-0.2.x branch May 11, 2026 08:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants