Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w2jh-77fq-7gp8 | OpAMP client reads unbounded HTTP response bodies |
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opentelemetry
Opentelemetry opentelemetry-dotnet-contrib |
|
| Vendors & Products |
Opentelemetry
Opentelemetry opentelemetry-dotnet-contrib |
Tue, 12 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenTelemetry.OpAmp.Client is the OpAMP client for OpenTelemetry .NET. Prior to 0.2.0-alpha.1, when receiving responses from the OpAMP server over HTTP, the OpAMP client allocates an unbounded buffer to read all bytes from the server, with no upper-bound on the number of bytes consumed. This could cause memory exhaustion in the consuming application if the configured OpAMP server is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned in the response. This vulnerability is fixed in 0.2.0-alpha.1. | |
| Title | OpAMP client reads unbounded HTTP response bodies | |
| Weaknesses | CWE-789 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T19:32:28.404Z
Reserved: 2026-04-26T13:26:14.515Z
Link: CVE-2026-42348
Updated: 2026-05-13T19:32:23.948Z
Status : Awaiting Analysis
Published: 2026-05-12T18:17:24.700
Modified: 2026-05-13T18:16:44.010
Link: CVE-2026-42348
No data.
OpenCVE Enrichment
Updated: 2026-05-12T23:30:26Z
Github GHSA