Impact
What kind of vulnerability is it? Who is impacted?
A vulnerability in OpenTelemetry.Api
package 1.10.0
to 1.11.1
could cause a Denial of Service (DoS) when a tracestate
and traceparent
header is received.
- Even if an application does not explicitly use trace context propagation, receiving these headers can still trigger high CPU usage.
- This issue impacts any application accessible over the web or backend services that process HTTP requests containing a
tracestate
header.
- Application may experience excessive resource consumption, leading to increased latency, degraded performance, or downtime.
Patches
Has the problem been patched? What versions should users upgrade to?
This issue has been resolved in OpenTelemetry.Api 1.11.2 by reverting the change that introduced the problematic behavior in versions 1.10.0 to 1.11.1.
The fix ensures that valid tracing headers no longer cause excessive CPU consumption when received in requests.Fixed Version:
OpenTelemetry .NET Version |
Status |
<= 1.9.x |
✅ Not affected |
1.10.0 - 1.11.1 |
❌ Vulnerable |
1.11.2 (Fixed) |
✅ Safe to use |
Upgrade Command:
dotnet add package OpenTelemetry --version 1.11.2
Delisting of Affected Packages
To prevent accidental usage, we have delisted the affected versions (1.10.0 to 1.11.1) from NuGet. Users should avoid these versions and upgrade to 1.11.2 immediately.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
References
Are there any links users can visit to find out more?
Impact
What kind of vulnerability is it? Who is impacted?
A vulnerability in
OpenTelemetry.Api
package1.10.0
to1.11.1
could cause a Denial of Service (DoS) when atracestate
andtraceparent
header is received.tracestate
header.Patches
Has the problem been patched? What versions should users upgrade to?
This issue has been resolved in OpenTelemetry.Api 1.11.2 by reverting the change that introduced the problematic behavior in versions 1.10.0 to 1.11.1.
Fixed Version:
Upgrade Command:
Delisting of Affected Packages
To prevent accidental usage, we have delisted the affected versions (1.10.0 to 1.11.1) from NuGet. Users should avoid these versions and upgrade to 1.11.2 immediately.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
References
Are there any links users can visit to find out more?