CVE-2026-29181

NameCVE-2026-29181
DescriptionOpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and allocations by sending many baggage: header lines, even when each individual value is within the 8192-byte per-value parse limit. This vulnerability is fixed in 1.41.0.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-opentelemetry-otel (PTS)bookworm1.1.0-2fixed
trixie1.31.0-4fixed
forky, sid1.31.0-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-opentelemetry-otelsource(unstable)(not affected)

Notes

- golang-opentelemetry-otel <not-affected> (Vulnerable code not present)
https://github.com/open-telemetry/opentelemetry-go/security/advisories/GHSA-mh2q-q3fh-2475
Introduced with: https://github.com/open-telemetry/opentelemetry-go/commit/f410084b21a46a212f6cabd37678fecc254d80f3 (v1.36.0)

Search for package or bug name: Reporting problems