drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in opentelemetry-collector
| Name: |
Mehrere Probleme in opentelemetry-collector |
|
| ID: |
RHSA-2025:3335 |
|
| Distribution: |
Red Hat |
|
| Plattformen: |
Red Hat Enterprise Linux AppStream (v. 9) |
|
| Datum: |
Do, 27. März 2025, 22:49 |
|
| Referenzen: |
https://bugzilla.redhat.com/show_bug.cgi?id=2341751
https://access.redhat.com/security/cve/CVE-2025-29786
https://access.redhat.com/security/cve/CVE-2024-45336
https://bugzilla.redhat.com/show_bug.cgi?id=2347423
https://access.redhat.com/errata/RHSA-2025:3335
https://access.redhat.com/security/cve/CVE-2025-22868
https://bugzilla.redhat.com/show_bug.cgi?id=2348366
https://bugzilla.redhat.com/show_bug.cgi?id=2352914
https://access.redhat.com/security/cve/CVE-2025-27144 |
|
| Applikationen: |
opentelemetry-collector |
|
Originalnachricht |
An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Collector with the supported components for a Red Hat build of OpenTelemetry
Security Fix(es):
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)
* github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2024-45336: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) CVE-2025-22868: Improper Validation of Syntactic Correctness of Input (CWE-1286) CVE-2025-27144: Allocation of Resources Without Limits or Throttling (CWE-770) CVE-2025-29786: Allocation of Resources Without Limits or Throttling (CWE-770)
|
|
|
|