OpenTelemetry-Go is the Go implementation of OpenTelemetry. Prior to 1.43.0, the otlp HTTP exporters (traces/metrics/logs) read the full HTTP response body into an in-memory bytes.Buffer without a size cap. This is exploitable for memory exhaustion when the configured collector endpoint is attacker-controlled (or a network attacker can mitm the exporter connection). This vulnerability is fixed in 1.43.0.
References
| Link | Resource |
|---|---|
| https://github.com/open-telemetry/opentelemetry-go/pull/8108 | Patch |
| https://github.com/open-telemetry/opentelemetry-go/security/advisories/GHSA-w8rr-5gcm-pp58 | Third Party Advisory |
Configurations
History
09 Apr 2026, 18:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/open-telemetry/opentelemetry-go/pull/8108 - Patch | |
| References | () https://github.com/open-telemetry/opentelemetry-go/security/advisories/GHSA-w8rr-5gcm-pp58 - Third Party Advisory | |
| First Time |
Opentelemetry opentelemetry
Opentelemetry |
|
| CPE | cpe:2.3:a:opentelemetry:opentelemetry:*:*:*:*:*:go:*:* |
08 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 21:17
Updated : 2026-04-09 18:39
NVD link : CVE-2026-39882
Mitre link : CVE-2026-39882
CVE.ORG link : CVE-2026-39882
JSON object : View
Products Affected
opentelemetry
- opentelemetry
CWE
CWE-789
Memory Allocation with Excessive Size Value
