Skip to content

Fix CVE-2026-1526: Update undici to 7.24.7#50

Open
blueguy wants to merge 1 commit intoredhat-actions:mainfrom
blueguy:fix_CVE-2026-1526
Open

Fix CVE-2026-1526: Update undici to 7.24.7#50
blueguy wants to merge 1 commit intoredhat-actions:mainfrom
blueguy:fix_CVE-2026-1526

Conversation

@blueguy
Copy link
Copy Markdown

@blueguy blueguy commented Apr 6, 2026

Description

This PR fixes a critical security vulnerability (CVE-2026-1526) in the undici package by updating it from version 5.29.0 to 7.24.7. The vulnerability allowed for unbounded memory consumption through WebSocket permessage-deflate
decompression, which could lead to denial of service attacks.

Related Issue(s)

Checklist

  • This PR includes a documentation change
  • This PR does not need a documentation change

  • This PR includes test changes
  • This PR's changes are already tested

  • This change is not user-facing
  • This change is a patch change
  • This change is a minor change
  • This change is a major (breaking) change

Changes made

Security Impact

Before: undici@5.29.0 with 5 high/moderate severity vulnerabilities
After: undici@7.24.7 with 0 vulnerabilities

This change addresses a remote DoS vulnerability where a malicious WebSocket server could send small compressed frames (~6MB) that expand to extremely large sizes (~1GB+), exhausting memory and causing the Node.js process to crash.

References

@blueguy blueguy marked this pull request as ready for review April 6, 2026 07:03
@blueguy blueguy force-pushed the fix_CVE-2026-1526 branch from 449b89d to bd630e7 Compare April 6, 2026 08:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant