Source: node-undici
Version: 7.18.2+dfsg+~cs3.2.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for node-undici.

CVE-2026-1526[0]:
| The undici WebSocket client is vulnerable to a denial-of-service
| attack via unbounded memory consumption during permessage-deflate
| decompression. When a WebSocket connection negotiates the
| permessage-deflate extension, the client decompresses incoming
| compressed frames without enforcing any limit on the decompressed
| data size. A malicious WebSocket server can send a small compressed
| frame (a "decompression bomb") that expands to an extremely large
| size in memory, causing the Node.js process to exhaust available
| memory and crash or become unresponsive.  The vulnerability exists
| in the PerMessageDeflate.decompress() method, which accumulates all
| decompressed chunks in memory and concatenates them into a single
| Buffer without checking whether the total size exceeds a safe
| threshold.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-1526
    https://www.cve.org/CVERecord?id=CVE-2026-1526
[1] https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to