Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mr8r-92fq-pj8p | OpenTelemetry dotnet: Unbounded `grpc-status-details-bin` parsing in OTLP/gRPC retry handling |
Wed, 29 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opentelemetry opentelemetry
|
|
| CPEs | cpe:2.3:a:opentelemetry:opentelemetry:*:*:*:*:*:.net:*:* | |
| Vendors & Products |
Opentelemetry opentelemetry
|
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opentelemetry
Opentelemetry opentelemetry-dotnet Opentelemetry opentelemetry.exporter.opentelemetryprotocol |
|
| Vendors & Products |
Opentelemetry
Opentelemetry opentelemetry-dotnet Opentelemetry opentelemetry.exporter.opentelemetryprotocol |
Thu, 23 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenTelemetry dotnet is a dotnet telemetry framework. From 1.13.1 to before 1.15.2, When exporting telemetry over gRPC using the OpenTelemetry Protocol (OTLP), the exporter may parse a server-provided grpc-status-details-bin trailer during retry handling. Prior to the fix, a malformed trailer could encode an extremely large length-delimited protobuf field which was used directly for allocation, allowing excessive memory allocation and potential denial of service (DoS). This vulnerability is fixed in 1.15.2. | |
| Title | OpenTelemetry dotnet: Unbounded `grpc-status-details-bin` parsing in OTLP/gRPC retry handling | |
| Weaknesses | CWE-789 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T18:23:08.858Z
Reserved: 2026-04-15T16:37:22.766Z
Link: CVE-2026-40891
Updated: 2026-04-23T18:22:55.571Z
Status : Analyzed
Published: 2026-04-23T18:16:28.483
Modified: 2026-04-29T14:15:05.133
Link: CVE-2026-40891
No data.
OpenCVE Enrichment
Updated: 2026-04-29T01:45:26Z
Github GHSA