CVE-2024-36129

The OpenTelemetry Collector offers a vendor-agnostic implementation on how to receive, process and export telemetry data. An unsafe decompression vulnerability allows unauthenticated attackers to crash the collector via excessive memory consumption. OTel Collector version 0.102.1 fixes this issue. It is also fixed in the confighttp module version 0.102.0 and configgrpc module version 0.102.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opentelemetry:configgrpc:*:*:*:*:*:go:*:*
cpe:2.3:a:opentelemetry:confighttp:*:*:*:*:*:go:*:*
cpe:2.3:a:opentelemetry:opentelemetry_collector:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://github.com/open-telemetry/opentelemetry-collector/pull/10289 - Patch () https://github.com/open-telemetry/opentelemetry-collector/pull/10289 - Patch
References () https://github.com/open-telemetry/opentelemetry-collector/pull/10323 - Patch () https://github.com/open-telemetry/opentelemetry-collector/pull/10323 - Patch
References () https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v - Exploit, Third Party Advisory () https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v - Exploit, Third Party Advisory
References () https://opentelemetry.io/blog/2024/cve-2024-36129 - Vendor Advisory () https://opentelemetry.io/blog/2024/cve-2024-36129 - Vendor Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.2

18 Jun 2024, 17:34

Type Values Removed Values Added
CPE cpe:2.3:a:opentelemetry:opentelemetry_collector:*:*:*:*:*:*:*:*
cpe:2.3:a:opentelemetry:configgrpc:*:*:*:*:*:go:*:*
cpe:2.3:a:opentelemetry:confighttp:*:*:*:*:*:go:*:*
References () https://github.com/open-telemetry/opentelemetry-collector/pull/10289 - () https://github.com/open-telemetry/opentelemetry-collector/pull/10289 - Patch
References () https://github.com/open-telemetry/opentelemetry-collector/pull/10323 - () https://github.com/open-telemetry/opentelemetry-collector/pull/10323 - Patch
References () https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v - () https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v - Exploit, Third Party Advisory
References () https://opentelemetry.io/blog/2024/cve-2024-36129 - () https://opentelemetry.io/blog/2024/cve-2024-36129 - Vendor Advisory
First Time Opentelemetry opentelemetry Collector
Opentelemetry
Opentelemetry configgrpc
Opentelemetry confighttp
CVSS v2 : unknown
v3 : 8.2
v2 : unknown
v3 : 7.5

06 Jun 2024, 14:17

Type Values Removed Values Added
Summary
  • (es) OpenTelemetry Collector ofrece una implementación independiente del proveedor sobre cómo recibir, procesar y exportar datos de telemetría. Una vulnerabilidad de descompresión insegura permite a atacantes no autenticados bloquear el recopilador mediante un consumo excesivo de memoria. La versión 0.102.1 de OTel Collector soluciona este problema. También está corregido en la versión 0.102.0 del módulo confighttp y en la versión 0.102.1 del módulo configgrpc.

05 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-05 18:15

Updated : 2024-11-21 09:21


NVD link : CVE-2024-36129

Mitre link : CVE-2024-36129

CVE.ORG link : CVE-2024-36129


JSON object : View

Products Affected

opentelemetry

  • confighttp
  • opentelemetry_collector
  • configgrpc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer