Source: node-undici
Version: 7.18.2+dfsg+~cs3.2.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for node-undici.

CVE-2026-1528[0]:
| ImpactA server can reply with a WebSocket frame using the 64-bit
| length form and an extremely large length. undici's ByteParser
| overflows internal math, ends up in an invalid state, and throws a
| fatal TypeError that terminates the process.  Patches  Patched in
| the undici version v7.24.0 and v6.24.0. Users should upgrade to this
| version or later.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-1528
    https://www.cve.org/CVERecord?id=CVE-2026-1528
[1] https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to