Source: node-undici Version: 7.18.2+dfsg+~cs3.2.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for node-undici. CVE-2026-1528[0]: | ImpactA server can reply with a WebSocket frame using the 64-bit | length form and an extremely large length. undici's ByteParser | overflows internal math, ends up in an invalid state, and throws a | fatal TypeError that terminates the process. Patches Patched in | the undici version v7.24.0 and v6.24.0. Users should upgrade to this | version or later. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-1528 https://www.cve.org/CVERecord?id=CVE-2026-1528 [1] https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj Please adjust the affected versions in the BTS as needed. Regards, Salvatore

