First published: Tue Apr 08 2025(Updated: )
Collector with the supported components for a Red Hat build of OpenTelemetry<br>Security Fix(es):<br><li> golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/opentelemetry-collector | <0.107.0-8.el9_4 | 0.107.0-8.el9_4 |
redhat/opentelemetry-collector | <0.107.0-8.el9_4 | 0.107.0-8.el9_4 |
redhat/opentelemetry-collector | <0.107.0-8.el9_4 | 0.107.0-8.el9_4 |
redhat/opentelemetry-collector | <0.107.0-8.el9_4.aa | 0.107.0-8.el9_4.aa |
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:3698 is classified as important.
To fix RHSA-2025:3698, update the opentelemetry-collector package to version 0.107.0-8.el9_4.
RHSA-2025:3698 addresses CVE-2025-30204, which allows excessive memory allocation during header parsing.
RHSA-2025:3698 affects the opentelemetry-collector package in Red Hat systems.
There is no documented workaround for RHSA-2025:3698; applying the update is the recommended action.