INFSA-2025:7479: opentelemetry-collector security update
Information about definition
Identificator: INFSA-2025:7479
Type: security
Release date: 2025-07-15 19:26:08 UTC
Information about package
Collector with the supported components for a Red Hat build of OpenTelemetry
Vulnerabilities description
- CVE-2025-30204
A flaw was found in the golang-jwt implementation of JSON Web Tokens (JWT). In affected versions, a malicious request with specially crafted Authorization header data may trigger an excessive consumption of resources on the host system. This issue can cause significant performance degradation or an application crash, leading to a denial of service.
- CVE-2025-27144
A flaw was found in GO-JOSE. In affected versions, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code uses strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of . characters. This issue could be exploied by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.
- CVE-2025-22868
An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
- CVE-2025-29786
A flaw was found in Expr. This vulnerability allows excessive memory usage and potential out-of-memory (OOM) crashes via unbounded input strings, where a malicious or inadvertent large expression can cause the parser to construct an extremely large Abstract Syntax Tree (AST), consuming excessive memory.
Severity level
CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
---|---|---|---|
NIST — CVE-2025-22868
|
no information | 7.5 | no information |
NIST — CVE-2025-29786
|
no information | 7.5 | no information |
NIST — CVE-2025-30204
|
no information | 7.5 | no information |
Updated packages