<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-29181 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-29181/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 07:33:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-29181/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenTelemetry-Go Multi-Value Baggage Header Extraction DoS Vulnerability (CVE-2026-29181)</title><link>https://feed.craftedsignal.io/briefs/2026-04-opentelemetry-dos/</link><pubDate>Wed, 29 Apr 2026 07:33:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-opentelemetry-dos/</guid><description>A vulnerability in OpenTelemetry-Go related to the extraction of multi-value baggage headers can lead to excessive resource allocation, resulting in a remote denial-of-service amplification.</description><content:encoded><![CDATA[<p>CVE-2026-29181 describes a vulnerability within the OpenTelemetry-Go library. Specifically, the manner in which the library handles HTTP requests containing multiple values within the <code>baggage</code> header can be exploited. An attacker can craft malicious requests with excessively large or numerous baggage values, leading to excessive memory allocations on the server. This resource exhaustion can ultimately result in a denial-of-service condition, impacting the availability of services relying on the vulnerable OpenTelemetry-Go component. This vulnerability highlights the importance of careful input validation and resource management in telemetry libraries.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a service using a vulnerable version of OpenTelemetry-Go.</li>
<li>The attacker crafts an HTTP request targeting an endpoint monitored by OpenTelemetry.</li>
<li>The crafted HTTP request includes a <code>baggage</code> header containing numerous values or excessively large individual values.</li>
<li>The OpenTelemetry-Go library attempts to extract and process these baggage values upon receiving the request.</li>
<li>The baggage extraction process triggers excessive memory allocations due to the large number or size of baggage values.</li>
<li>Repeated requests of this nature rapidly consume available server memory.</li>
<li>The server&rsquo;s performance degrades significantly as it struggles to allocate memory.</li>
<li>Ultimately, the server becomes unresponsive, resulting in a denial-of-service condition, making the service unavailable to legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29181 leads to a denial-of-service condition. The number of affected services depends on the prevalence of vulnerable OpenTelemetry-Go library versions in production environments. Affected services become unavailable, disrupting normal operations and potentially leading to financial losses or reputational damage. The impact is amplified if critical infrastructure components rely on the vulnerable services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenTelemetry-Go to a patched version that addresses CVE-2026-29181 to prevent excessive memory allocation.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Baggage Header Size</code> to identify potentially malicious requests exploiting this vulnerability.</li>
<li>Implement rate limiting on HTTP endpoints that are monitored by OpenTelemetry to mitigate the impact of denial-of-service attacks.</li>
<li>Review and adjust memory allocation limits for services using OpenTelemetry-Go to prevent resource exhaustion.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>opentelemetry</category><category>cve-2026-29181</category></item></channel></rss>