First published: Thu Apr 03 2025(Updated: )
Collector with the supported components for a Red Hat build of OpenTelemetry<br>Security Fix(es):<br><li> golang: net/<a href="http:" target="_blank">http:</a> net/<a href="http:" target="_blank">http:</a> sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)</li> <li> go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)</li> <li> golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)</li> <li> github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
redhat/opentelemetry-collector | <0.107.0-7.el9_4 | 0.107.0-7.el9_4 |
redhat/opentelemetry-collector | <0.107.0-7.el9_4 | 0.107.0-7.el9_4 |
redhat/opentelemetry-collector | <0.107.0-7.el9_4 | 0.107.0-7.el9_4 |
redhat/opentelemetry-collector | <0.107.0-7.el9_4.aa | 0.107.0-7.el9_4.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2025:3593 has a moderate severity level due to sensitive headers being incorrectly sent after cross-domain redirects.
To fix RHSA-2025:3593, update the opentelemetry-collector package to version 0.107.0-7.el9_4.
RHSA-2025:3593 affects several Red Hat Enterprise Linux Server variants, including ARM, Power, and IBM z Systems.
Failing to address RHSA-2025:3593 may expose your applications to security risks from incorrect handling of sensitive headers.
RHSA-2025:3593 concerns the opentelemetry-collector component, which is part of the OpenTelemetry project.