CVE-2026-41173
Description
The AWS X-Ray Remote Sampler package provides a sampler which can get sampling configurations from AWS X-Ray. Prior to 0.1.0-alpha.8, OpenTelemetry.Sampler.AWS reads unbounded HTTP response bodies from a configured AWS X-Ray remote sampling endpoint into memory. AWSXRaySamplerClient.DoRequestAsync called HttpClient.SendAsync followed by ReadAsStringAsync(), which materializes the entire HTTP response body into a single in-memory string with no size limit. The sampling endpoint is configurable via AWSXRayRemoteSamplerBuilder.SetEndpoint (default: http://localhost:2000). An attacker who controls the configured endpoint, or who can intercept traffic to it (MitM), can return an arbitrarily large response body. This causes unbounded heap allocation in the consuming process, leading to high transient memory pressure, garbage-collection stalls, or an OutOfMemoryException that terminates the process. This vulnerability is fixed in 0.1.0-alpha.8.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
OpenTelemetry.Sampler.AWSNuGet | < 0.1.0-alpha.8 | 0.1.0-alpha.8 |
OpenTelemetry.Resources.AWSNuGet | < 1.15.1 | 1.15.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-28xm-prxc-5866ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41173ghsaADVISORY
- github.com/open-telemetry/opentelemetry-dotnet-contrib/pull/4100nvdWEB
- github.com/open-telemetry/opentelemetry-dotnet-contrib/pull/4122ghsaWEB
- github.com/open-telemetry/opentelemetry-dotnet-contrib/security/advisories/GHSA-28xm-prxc-5866nvdWEB
News mentions
0No linked articles in our index yet.