blob: 990dc89452b533bab591eb7759f8aa0ce51e4023 [file] [log] [blame]
id: GO-2023-2331
modules:
- module: go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc
versions:
- fixed: 0.46.0
vulnerable_at: 0.45.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc
symbols:
- StreamClientInterceptor
- UnaryClientInterceptor
- UnaryServerInterceptor
- spanInfo
- StreamServerInterceptor
summary: |-
Denial of service in
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc
description: |-
The grpc Unary Server Interceptor created by the otelgrpc package added the
labels net.peer.sock.addr and net.peer.sock.port with unbounded cardinality.
This can lead to the server's potential memory exhaustion when many malicious
requests are sent. This leads to a denial-of-service.
cves:
- CVE-2023-47108
ghsas:
- GHSA-8pgv-569h-w5rw
references:
- advisory: https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw
- fix: https://github.com/open-telemetry/opentelemetry-go-contrib/commit/b44dfc9092b157625a5815cb437583cee663333b
- fix: https://github.com/open-telemetry/opentelemetry-go-contrib/pull/4322
- web: https://pkg.go.dev/go.opentelemetry.io/otel/metric/noop#NewMeterProvider
source:
id: GHSA-8pgv-569h-w5rw
created: 2024-06-26T17:06:54.775224-07:00
review_status: REVIEWED
unexcluded: DEPENDENT_VULNERABILITY