Source: node-undici
Version: 7.18.2+dfsg+~cs3.2.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for node-undici.

CVE-2026-2581[0]:
| This is an uncontrolled resource consumption vulnerability (CWE-400)
| that can lead to Denial of Service (DoS).  In vulnerable Undici
| versions, when interceptors.deduplicate() is enabled, response data
| for deduplicated requests could be accumulated in memory for
| downstream handlers. An attacker-controlled or untrusted upstream
| endpoint can exploit this with large/chunked responses and
| concurrent identical requests, causing high memory usage and
| potential OOM process termination.  Impacted users are applications
| that use Undici’s deduplication interceptor against endpoints that
| may produce large or long-lived response bodies.  PatchesThe issue
| has been patched by changing deduplication behavior to stream
| response chunks to downstream handlers as they arrive (instead of
| full-body accumulation), and by preventing late deduplication when
| body streaming has already started.  Users should upgrade to the
| first official Undici (and Node.js, where applicable) releases that
| include this patch.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-2581
    https://www.cve.org/CVERecord?id=CVE-2026-2581
[1] https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to