What kind of vulnerability is it? Who is impacted?
A vulnerability in OpenTelemetry.Api
package 1.10.0
to 1.11.1
could cause a Denial of Service (DoS) when a tracestate
and traceparent
header is received.
tracestate
header.Has the problem been patched? What versions should users upgrade to?
This issue has been <strong data-start="1143" data-end="1184">resolved in OpenTelemetry.Api 1.11.2</strong> by <strong data-start="1188" data-end="1212">reverting the change</strong> that introduced the problematic behavior in versions <strong data-start="1266" data-end="1286">1.10.0 to 1.11.1</strong>.</li><li data-start="1290" data-end="1409">The fix ensures that <strong data-start="1313" data-end="1380">valid tracing headers no longer cause excessive CPU consumption</strong> when received in requests.</li></ul><h4 data-start="1411" data-end="1434"><strong data-start="1416" data-end="1434">Fixed Version:</strong></h4> OpenTelemetry .NET Version | Status -- | -- <= 1.9.x | ✅ Not affected 1.10.0 - 1.11.1 | ❌ Vulnerable 1.11.2 (Fixed) | ✅ Safe to use
Upgrade Command:
dotnet add package OpenTelemetry --version 1.11.2
Delisting of Affected Packages To prevent accidental usage, we have delisted the affected versions (1.10.0 to 1.11.1) from NuGet. Users should avoid these versions and upgrade to 1.11.2 immediately.
Is there a way for users to fix or remediate the vulnerability without upgrading?
Are there any links users can visit to find out more?
{ "nvd_published_at": "2025-03-05T19:15:39Z", "cwe_ids": [ "CWE-770" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-03-05T18:15:22Z" }