Bug 2447144 (CVE-2026-1525) - CVE-2026-1525 undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers
Summary: CVE-2026-1525 undici: Undici: HTTP Request Smuggling and Denial of Service du...
Keywords:
Status: NEW
Alias: CVE-2026-1525
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2447167 2447168 2447170 2447174
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-12 21:01 UTC by OSIDB Bzimport
Modified: 2026-04-14 06:52 UTC (History)
58 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:7080 0 None None None 2026-04-08 13:54:37 UTC
Red Hat Product Errata RHSA-2026:7123 0 None None None 2026-04-08 18:04:55 UTC
Red Hat Product Errata RHSA-2026:7302 0 None None None 2026-04-09 12:47:19 UTC
Red Hat Product Errata RHSA-2026:7310 0 None None None 2026-04-09 13:20:00 UTC
Red Hat Product Errata RHSA-2026:7350 0 None None None 2026-04-09 20:20:50 UTC
Red Hat Product Errata RHSA-2026:7670 0 None None None 2026-04-13 02:47:41 UTC
Red Hat Product Errata RHSA-2026:7675 0 None None None 2026-04-13 02:23:09 UTC
Red Hat Product Errata RHSA-2026:7983 0 None None None 2026-04-14 06:52:11 UTC

Description OSIDB Bzimport 2026-03-12 21:01:56 UTC
Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire.

Who is impacted:

  *  Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays
  *  Applications that accept user-controlled header names without case-normalization


Potential consequences:

  *  Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request)
  *  HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking

Comment 3 errata-xmlrpc 2026-04-08 13:54:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:7080 https://access.redhat.com/errata/RHSA-2026:7080

Comment 4 errata-xmlrpc 2026-04-08 18:04:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:7123 https://access.redhat.com/errata/RHSA-2026:7123

Comment 5 errata-xmlrpc 2026-04-09 12:47:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:7302 https://access.redhat.com/errata/RHSA-2026:7302

Comment 6 errata-xmlrpc 2026-04-09 13:19:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:7310 https://access.redhat.com/errata/RHSA-2026:7310

Comment 7 errata-xmlrpc 2026-04-09 20:20:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:7350 https://access.redhat.com/errata/RHSA-2026:7350

Comment 8 errata-xmlrpc 2026-04-13 02:23:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:7675 https://access.redhat.com/errata/RHSA-2026:7675

Comment 9 errata-xmlrpc 2026-04-13 02:47:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:7670 https://access.redhat.com/errata/RHSA-2026:7670

Comment 11 errata-xmlrpc 2026-04-14 06:52:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:7983 https://access.redhat.com/errata/RHSA-2026:7983


Note You need to log in before you can comment on or make changes to this bug.