{"id":"RLSA-2025:7479","summary":"Important: opentelemetry-collector security update","details":"Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry\n\nSecurity Fix(es):\n\n* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)\n\n* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)\n\n* github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)\n\n* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2025-10-08T17:12:39.190799Z","published":"2025-10-03T19:56:45.270310Z","upstream":["CVE-2025-22868","CVE-2025-27144","CVE-2025-29786","CVE-2025-30204"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2025:7479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348366"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2352914"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354195"}],"affected":[{"package":{"name":"opentelemetry-collector","ecosystem":"Rocky Linux:10","purl":"pkg:rpm/rocky-linux/opentelemetry-collector?distro=rocky-linux-10-0&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.107.0-9.el10_0"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2025:7479.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}