Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1528

Опубликовано: 12 мар. 2026
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 4io.cryostat-cryostatAffected
OpenShift Lightspeedopenshift-lightspeed/lightspeed-console-plugin-pf5-rhel9Affected
OpenShift Lightspeedopenshift-lightspeed/lightspeed-console-plugin-rhel9Affected
OpenShift Pipelinesopenshift-pipelines/pipelines-console-plugin-rhel8Affected
OpenShift Pipelinesopenshift-pipelines/pipelines-console-plugin-rhel9Affected
Red Hat Developer Hubrhdh/backstage-community-plugin-catalog-backend-module-scaffolder-relation-processorAffected
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Affected
Red Hat Enterprise Linux 10nodejs22Affected
Red Hat Enterprise Linux 10nodejs24Affected
Red Hat Enterprise Linux 8nodejs:22/nodejsAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-248
https://bugzilla.redhat.com/show_bug.cgi?id=2447145undici: undici: Denial of Service via crafted WebSocket frame with large length

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
18 дней назад

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

CVSS3: 7.5
nvd
18 дней назад

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

CVSS3: 7.5
debian
18 дней назад

ImpactA server can reply with a WebSocket frame using the 64-bit lengt ...

CVSS3: 7.5
github
17 дней назад

Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client

7.5 High

CVSS3