Bug 2436557 (CVE-2026-25224) - CVE-2026-25224 Fastify: Fastify: Denial of Service via unbounded buffering in Web Streams response handling
Summary: CVE-2026-25224 Fastify: Fastify: Denial of Service via unbounded buffering in...
Keywords:
Status: NEW
Alias: CVE-2026-25224
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-03 22:01 UTC by OSIDB Bzimport
Modified: 2026-02-04 03:38 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-02-03 22:01:30 UTC
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.3, a denial-of-service vulnerability in Fastify’s Web Streams response handling can allow a remote client to exhaust server memory. Applications that return a ReadableStream (or Response with a Web Stream body) via reply.send() are impacted. A slow or non-reading client can trigger unbounded buffering when backpressure is ignored, leading to process crashes or severe degradation. This issue has been patched in version 5.7.3.


Note You need to log in before you can comment on or make changes to this bug.