UBUNTU-CVE-2026-1527

Source
https://ubuntu.com/security/CVE-2026-1527
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-1527.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-1527
Upstream
Published
2026-03-12T21:16:00Z
Modified
2026-03-19T08:27:10.164364Z
Severity
  • 4.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to: * Inject arbitrary HTTP headers * Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch) The vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters: // lib/dispatcher/client-h1.js:1121 if (upgrade) { header += connection: upgrade\r\nupgrade: ${upgrade}\r\n }

References

Affected packages

Ubuntu:24.04:LTS / node-undici

Package

Name
node-undici
Purl
pkg:deb/ubuntu/node-undici@5.26.3+dfsg1+~cs23.10.12-2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.22.1+dfsg1+~cs20.10.10.2-1ubuntu1
5.26.3+dfsg1+~cs23.10.12-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "9.1.3~5.26.3+dfsg1+~cs23.10.12-2",
            "binary_name": "node-llhttp"
        },
        {
            "binary_version": "5.26.3+dfsg1+~cs23.10.12-2",
            "binary_name": "node-undici"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-1527.json"

Ubuntu:25.10 / node-undici

Package

Name
node-undici
Purl
pkg:deb/ubuntu/node-undici@7.3.0+dfsg1+~cs24.12.11-2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*
7.3.0+dfsg1+~cs24.12.11-1
7.3.0+dfsg1+~cs24.12.11-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "9.2.1~7.3.0+dfsg1+~cs24.12.11-2",
            "binary_name": "libllhttp-dev"
        },
        {
            "binary_version": "9.2.1~7.3.0+dfsg1+~cs24.12.11-2",
            "binary_name": "libllhttp9.2"
        },
        {
            "binary_version": "9.2.1~7.3.0+dfsg1+~cs24.12.11-2",
            "binary_name": "node-llhttp"
        },
        {
            "binary_version": "7.3.0+dfsg1+~cs24.12.11-2",
            "binary_name": "node-undici"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-1527.json"