Skip to content

chore(deps): update dependency k8sgpt-ai/k8sgpt to v0.4.31#18941

Merged
github-actions[bot] merged 1 commit intomainfrom
renovate/k8sgpt-ai-k8sgpt-0.4.x
Mar 24, 2026
Merged

chore(deps): update dependency k8sgpt-ai/k8sgpt to v0.4.31#18941
github-actions[bot] merged 1 commit intomainfrom
renovate/k8sgpt-ai-k8sgpt-0.4.x

Conversation

@uniget-bot
Copy link

@uniget-bot uniget-bot commented Feb 15, 2026

This PR contains the following updates:

Package Update Change
k8sgpt-ai/k8sgpt patch 0.4.270.4.31

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

k8sgpt-ai/k8sgpt (k8sgpt-ai/k8sgpt)

v0.4.31

Compare Source

Features
Other
Docs

v0.4.30

Compare Source

Bug Fixes

v0.4.29

Compare Source

Features
Bug Fixes
Refactoring
  • improve MCP server handlers with better error handling and pagination (#​1613) (abc4647)

v0.4.28

Compare Source

Features
Bug Fixes
  • align CI Go versions with go.mod to ensure consistency (#​1611) (1f2ff98)
  • deps: update module gopkg.in/yaml.v2 to v3 (#​1550) (7fe3bdb)
  • use MaxCompletionTokens instead of deprecated MaxTokens for OpenAI (#​1604) (c80b2e2)
Other

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@uniget-bot uniget-bot force-pushed the renovate/k8sgpt-ai-k8sgpt-0.4.x branch from 87ce090 to 0c48a5e Compare February 20, 2026 17:01
@uniget-bot uniget-bot changed the title chore(deps): update dependency k8sgpt-ai/k8sgpt to v0.4.28 chore(deps): update dependency k8sgpt-ai/k8sgpt to v0.4.30 Feb 20, 2026
Copy link

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@nicholasdille
Copy link
Contributor

See k8sgpt-ai/k8sgpt#1622

@uniget-bot uniget-bot force-pushed the renovate/k8sgpt-ai-k8sgpt-0.4.x branch from 0c48a5e to 8d69e50 Compare March 24, 2026 17:17
@uniget-bot uniget-bot changed the title chore(deps): update dependency k8sgpt-ai/k8sgpt to v0.4.30 chore(deps): update dependency k8sgpt-ai/k8sgpt to v0.4.31 Mar 24, 2026
Copy link

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@github-actions
Copy link

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/k8sgpt:0.4.31

📦 Image Reference ghcr.io/uniget-org/tools/k8sgpt:0.4.31
digestsha256:a0c93452d4633d5662fa32d461f6664ea2e7634ee5bbfde4c247b37ed6e61b8d
vulnerabilitiescritical: 2 high: 13 medium: 9 low: 2 unspecified: 1
platformlinux/amd64
size32 MB
packages260
critical: 1 high: 6 medium: 1 low: 0 github.com/ollama/ollama 0.13.4 (golang)

pkg:golang/github.com/ollama/ollama@0.13.4

critical 9.3: CVE--2025--63389 Improper Access Control

Affected range<=0.13.5
Fixed versionNot Fixed
CVSS Score9.3
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Description

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

high : CVE--2025--0317

Affected range>=0
Fixed versionNot Fixed
Description

Ollama Divide By Zero vulnerability in github.com/ollama/ollama

high : CVE--2025--0315

Affected range>=0
Fixed versionNot Fixed
Description

Ollama Allocation of Resources Without Limits or Throttling vulnerability in github.com/ollama/ollama

high : CVE--2025--0312

Affected range>=0
Fixed versionNot Fixed
Description

Ollama Denial of Service (DoS) via Null Pointer Dereference in github.com/ollama/ollama

high : CVE--2024--8063

Affected range>=0
Fixed versionNot Fixed
Description

Ollama Divide by Zero Vulnerability in github.com/ollama/ollama

high : CVE--2024--12886

Affected range>=0
Fixed versionNot Fixed
Description

Ollama Vulnerable to Denial of Service (DoS) via Crafted GZIP in github.com/ollama/ollama

high : CVE--2024--12055

Affected range>=0
Fixed versionNot Fixed
Description

Ollama Allows Out-of-Bounds Read in github.com/ollama/ollama

medium : CVE--2025--51471

Affected range>=0
Fixed versionNot Fixed
Description

Ollama vulnerable to Cross-Domain Token Exposure in github.com/ollama/ollama

critical: 1 high: 0 medium: 0 low: 0 google.golang.org/grpc 1.73.0 (golang)

pkg:golang/google.golang.org/grpc@1.73.0

critical 9.1: CVE--2026--33186 Improper Authorization

Affected range<1.79.3
Fixed version1.79.3
CVSS Score9.1
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

Impact

What kind of vulnerability is it? Who is impacted?

It is an Authorization Bypass resulting from Improper Input Validation of the HTTP/2 :path pseudo-header.

The gRPC-Go server was too lenient in its routing logic, accepting requests where the :path omitted the mandatory leading slash (e.g., Service/Method instead of /Service/Method). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official grpc/authz package) evaluated the raw, non-canonical path string. Consequently, "deny" rules defined using canonical paths (starting with /) failed to match the incoming request, allowing it to bypass the policy if a fallback "allow" rule was present.

Who is impacted?
This affects gRPC-Go servers that meet both of the following criteria:

  1. They use path-based authorization interceptors, such as the official RBAC implementation in google.golang.org/grpc/authz or custom interceptors relying on info.FullMethod or grpc.Method(ctx).
  2. Their security policy contains specific "deny" rules for canonical paths but allows other requests by default (a fallback "allow" rule).

The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed :path headers directly to the gRPC server.

Patches

Has the problem been patched? What versions should users upgrade to?

Yes, the issue has been patched. The fix ensures that any request with a :path that does not start with a leading slash is immediately rejected with a codes.Unimplemented error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string.

Users should upgrade to the following versions (or newer):

  • v1.79.3
  • The latest master branch.

It is recommended that all users employing path-based authorization (especially grpc/authz) upgrade as soon as the patch is available in a tagged release.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods:

1. Use a Validating Interceptor (Recommended Mitigation)

Add an "outermost" interceptor to your server that validates the path before any other authorization logic runs:

func pathValidationInterceptor(ctx context.Context, req any, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (any, error) {
    if info.FullMethod == "" || info.FullMethod[0] != '/' {
        return nil, status.Errorf(codes.Unimplemented, "malformed method name")
    }   
    return handler(ctx, req)
}

// Ensure this is the FIRST interceptor in your chain
s := grpc.NewServer(
    grpc.ChainUnaryInterceptor(pathValidationInterceptor, authzInterceptor),
)

2. Infrastructure-Level Normalization

If your gRPC server is behind a reverse proxy or load balancer (such as Envoy, NGINX, or an L7 Cloud Load Balancer), ensure it is configured to enforce strict HTTP/2 compliance for pseudo-headers and reject or normalize requests where the :path header does not start with a leading slash.

3. Policy Hardening

Switch to a "default deny" posture in your authorization policies (explicitly listing all allowed paths and denying everything else) to reduce the risk of bypasses via malformed inputs.

critical: 0 high: 1 medium: 2 low: 0 golang.org/x/crypto 0.40.0 (golang)

pkg:golang/golang.org/x/crypto@0.40.0

high : CVE--2025--47913

Affected range<0.43.0
Fixed version0.43.0
Description

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

medium 5.3: CVE--2025--58181 Allocation of Resources Without Limits or Throttling

Affected range<0.45.0
Fixed version0.45.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

medium 5.3: CVE--2025--47914 Out-of-bounds Read

Affected range<0.45.0
Fixed version0.45.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

critical: 0 high: 1 medium: 2 low: 0 helm.sh/helm/v3 3.17.4 (golang)

pkg:golang/helm.sh/helm/v3@3.17.4

high : CVE--2025--53547

Affected range<3.18.4
Fixed version3.18.4
Description

Helm vulnerable to Code Injection through malicious chart.yaml content in helm.sh/helm

medium 6.5: CVE--2025--55199 Allocation of Resources Without Limits or Throttling

Affected range<3.18.5
Fixed version3.18.5
CVSS Score6.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Description

A Helm contributor discovered that it was possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination.

Impact

A malicious chart can point $ref in values.schema.json to a device (e.g. /dev/*) or other problem file which could cause Helm to use all available memory and have an out of memory (OOM) termination.

Patches

This issue has been resolved in Helm v3.18.5.

Workarounds

Make sure that all Helm charts that are being loaded into Helm doesn't have any reference of $ref pointing to /dev/zero.

References

Helm's security policy is spelled out in detail in our SECURITY document.

Credits

Disclosed by Jakub Ciolek at AlphaSense.

medium 6.5: CVE--2025--55198 Use of Uninitialized Resource

Affected range<3.18.5
Fixed version3.18.5
CVSS Score6.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Description

A Helm contributor discovered an improper validation of type error when parsing Chart.yaml and index.yaml files that can lead to a panic.

Impact

There are two areas of YAML validation that were impacted. First, when a Chart.yaml file had a null maintainer or the child or parent of a dependencies import-values could be parsed as something other than a string, helm lint would panic. Second, when an index.yaml had an empty entry in the list of chart versions Helm would panic on interactions with that repository.

Patches

This issue has been resolved in Helm v3.18.5.

Workarounds

Ensure YAML files are formatted as Helm expects prior to processing them with Helm.

References

Helm's security policy is spelled out in detail in our SECURITY document.

Credits

Disclosed by Jakub Ciolek at AlphaSense.

critical: 0 high: 1 medium: 1 low: 1 stdlib 1.24.13 (golang)

pkg:golang/stdlib@1.24.13

high : CVE--2026--25679

Affected range<1.25.8
Fixed version1.25.8
Description

url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.

medium : CVE--2026--27142

Affected range<1.25.8
Fixed version1.25.8
Description

Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh".

A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0.

low : CVE--2026--27139

Affected range<1.25.8
Fixed version1.25.8
Description

On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened.

The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.

critical: 0 high: 1 medium: 0 low: 0 unspecified: 1github.liu-huaimin.workers.dev/buger/jsonparser 1.1.1 (golang)

pkg:golang/github.com/buger/jsonparser@1.1.1

high 7.5: GHSA--6g7g--w4f8--9c9x Out-of-bounds Read

Affected range<=1.1.1
Fixed version1.1.2
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

The Delete function fails to properly validate offsets when processing malformed JSON input. This can lead to a negative slice index and a runtime panic, allowing a denial of service attack.

unspecified : GO--2026--4514

Affected range>=0.0.0
Fixed versionNot Fixed
Description

The Delete function fails to properly validate offsets when processing malformed JSON input. This can lead to a negative slice index and a runtime panic, allowing a denial of service attack.

critical: 0 high: 1 medium: 0 low: 0 github.com/kedacore/keda/v2 2.16.0 (golang)

pkg:golang/github.com/kedacore/keda/v2@2.16.0

high 8.2: CVE--2025--68476 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Affected range<2.17.3
Fixed version2.17.3
CVSS Score8.2
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
Description

Impact

An Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication.

The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount.

An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request.

The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd.

Patches

The problem has been patched in v2.17.3 and 2.18.3 as well as in main branch.

Workarounds

The only effective workaround is the strict restriction of permissions for creating and modifying TriggerAuthentication resources within the Kubernetes cluster.

Only trusted and authorized users should have create or update permissions on the TriggerAuthentication resource.

This limits an attacker's ability to configure a malicious TriggerAuthentication with an arbitrary path.

Is my project affected?

If it execute s

kubectl get deploy keda-operator -n keda -o jsonpath="{.spec.template.spec.containers[0].image}"

and the version is not 2.17.3, 2.18.3 or >= 2.19.0, that version is affected.

critical: 0 high: 1 medium: 0 low: 0 go.opentelemetry.io/otel/sdk 1.36.0 (golang)

pkg:golang/go.opentelemetry.io/otel/sdk@1.36.0

high 7.0: CVE--2026--24051 Untrusted Search Path

Affected range>=1.21.0
<1.40.0
Fixed version1.40.0
CVSS Score7
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Impact

The OpenTelemetry Go SDK in version v1.20.0-1.39.0 is vulnerable to Path Hijacking (Untrusted Search Paths) on macOS/Darwin systems. The resource detection code in sdk/resource/host_id.go executes the ioreg system command using a search path. An attacker with the ability to locally modify the PATH environment variable can achieve Arbitrary Code Execution (ACE) within the context of the application.

Patches

This has been patched in d45961b, which was released with v1.40.0.

References

critical: 0 high: 1 medium: 0 low: 0 github.com/docker/cli 26.1.4+incompatible (golang)

pkg:golang/github.com/docker/cli@26.1.4+incompatible

high 7.0: CVE--2025--15558 Uncontrolled Search Path Element

Affected range>=19.03.0
<29.2.0
Fixed version29.2.0
CVSS Score7
CVSS VectorCVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Description

This issue affects Docker CLI through 29.1.5

Impact

Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker CLI is executed as a privileged user.

This issue affects Docker CLI through v29.1.5 (fixed in v29.2.0). It impacts Windows binaries acting as a CLI plugin manager via the github.com/docker/cli/cli-plugins/manager package, which is consumed by downstream projects such as Docker Compose.

Docker Compose became affected starting in v2.31.0, when it incorporated the relevant CLI plugin manager code (see docker/compose#12300), and is fixed in v5.1.0.

This issue does not impact non-Windows binaries or projects that do not use the plugin manager code.

Patches

Fixed version starts with 29.2.0

This issue was fixed in docker/cli@1375933 (docker/cli#6713), which removed %PROGRAMDATA%\Docker\cli-plugins from the list of paths used for plugin-discovery on Windows.

Workarounds

None

Resources

Credits

Nitesh Surana (niteshsurana.com) of Trend Research of TrendAI

critical: 0 high: 0 medium: 2 low: 0 golang.org/x/net 0.42.0 (golang)

pkg:golang/golang.org/x/net@0.42.0

medium : CVE--2025--58190

Affected range<0.45.0
Fixed version0.45.0
Description

The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

medium : CVE--2025--47911

Affected range<0.45.0
Fixed version0.45.0
Description

The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

critical: 0 high: 0 medium: 1 low: 1 github.com/aws/aws-sdk-go 1.55.7 (golang)

pkg:golang/github.com/aws/aws-sdk-go@1.55.7

medium : CVE--2020--8911

Affected range>=0
Fixed versionNot Fixed
Description

A padding oracle vulnerability exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. The SDK allows users to encrypt files with AES-CBC without computing a Message Authentication Code (MAC), which then allows an attacker who has write access to the target's S3 bucket and can observe whether or not an endpoint with access to the key can decrypt a file, they can reconstruct the plaintext with (on average) 128*length (plaintext) queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors. It is recommended to update your SDK to V2 or later, and re-encrypt your files.

low : CVE--2020--8912

Affected range>=0
Fixed versionNot Fixed
Description

A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them to change AES-GCM to AES-CTR. Using this in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation. It is recommended to update your SDK to V2 or later, and re-encrypt your files.

@github-actions
Copy link

@github-actions
Copy link

@github-actions github-actions bot merged commit 9ec1e9d into main Mar 24, 2026
9 checks passed
@github-actions github-actions bot deleted the renovate/k8sgpt-ai-k8sgpt-0.4.x branch March 24, 2026 17:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants