Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-59465 (GCVE-0-2025-59465)
Vulnerability from cvelistv5 – Published: 2026-01-20 20:41 – Updated: 2026-01-21 20:11- CWE-400 - Uncontrolled Resource Consumption
| Vendor | Product | Version | ||
|---|---|---|---|---|
| nodejs | node |
Affected:
20.19.6 , ≤ 20.19.6
(semver)
Affected: 22.21.1 , ≤ 22.21.1 (semver) Affected: 24.12.0 , ≤ 24.12.0 (semver) Affected: 25.2.1 , ≤ 25.2.1 (semver) Affected: 4.0 , < 4.* (semver) Affected: 5.0 , < 5.* (semver) Affected: 6.0 , < 6.* (semver) Affected: 7.0 , < 7.* (semver) Affected: 8.0 , < 8.* (semver) Affected: 9.0 , < 9.* (semver) Affected: 10.0 , < 10.* (semver) Affected: 11.0 , < 11.* (semver) Affected: 12.0 , < 12.* (semver) Affected: 13.0 , < 13.* (semver) Affected: 14.0 , < 14.* (semver) Affected: 15.0 , < 15.* (semver) Affected: 16.0 , < 16.* (semver) Affected: 17.0 , < 17.* (semver) Affected: 18.0 , < 18.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-59465",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-21T20:10:32.296610Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-21T20:11:28.986Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "node",
"vendor": "nodejs",
"versions": [
{
"lessThanOrEqual": "20.19.6",
"status": "affected",
"version": "20.19.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "22.21.1",
"status": "affected",
"version": "22.21.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "24.12.0",
"status": "affected",
"version": "24.12.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "25.2.1",
"status": "affected",
"version": "25.2.1",
"versionType": "semver"
},
{
"lessThan": "4.*",
"status": "affected",
"version": "4.0",
"versionType": "semver"
},
{
"lessThan": "5.*",
"status": "affected",
"version": "5.0",
"versionType": "semver"
},
{
"lessThan": "6.*",
"status": "affected",
"version": "6.0",
"versionType": "semver"
},
{
"lessThan": "7.*",
"status": "affected",
"version": "7.0",
"versionType": "semver"
},
{
"lessThan": "8.*",
"status": "affected",
"version": "8.0",
"versionType": "semver"
},
{
"lessThan": "9.*",
"status": "affected",
"version": "9.0",
"versionType": "semver"
},
{
"lessThan": "10.*",
"status": "affected",
"version": "10.0",
"versionType": "semver"
},
{
"lessThan": "11.*",
"status": "affected",
"version": "11.0",
"versionType": "semver"
},
{
"lessThan": "12.*",
"status": "affected",
"version": "12.0",
"versionType": "semver"
},
{
"lessThan": "13.*",
"status": "affected",
"version": "13.0",
"versionType": "semver"
},
{
"lessThan": "14.*",
"status": "affected",
"version": "14.0",
"versionType": "semver"
},
{
"lessThan": "15.*",
"status": "affected",
"version": "15.0",
"versionType": "semver"
},
{
"lessThan": "16.*",
"status": "affected",
"version": "16.0",
"versionType": "semver"
},
{
"lessThan": "17.*",
"status": "affected",
"version": "17.0",
"versionType": "semver"
},
{
"lessThan": "18.*",
"status": "affected",
"version": "18.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```"
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-20T20:41:55.317Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2025-59465",
"datePublished": "2026-01-20T20:41:55.317Z",
"dateReserved": "2025-09-16T15:00:07.875Z",
"dateUpdated": "2026-01-21T20:11:28.986Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-59465\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2026-01-20T21:16:04.010\",\"lastModified\":\"2026-01-30T20:25:39.890\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\\n```\\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\\n socket.on(\u0027error\u0027, err =\u003e {\\n console.log(err)\\n })\\n})\\n```\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"20.0.0\",\"versionEndExcluding\":\"20.20.0\",\"matchCriteriaId\":\"A78B4AE9-C1B4-4DD0-9EDF-A3A60431B6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"22.0.0\",\"versionEndExcluding\":\"22.22.0\",\"matchCriteriaId\":\"132A7510-B3E9-4F85-9B61-A834B12DD7D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"24.0.0\",\"versionEndExcluding\":\"24.13.0\",\"matchCriteriaId\":\"A83233BD-D901-4A1A-A3AF-0DC3E76CD2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"25.0.0\",\"versionEndExcluding\":\"25.3.0\",\"matchCriteriaId\":\"970EF154-D905-4FDA-85CB-C3AB08BEFAEC\"}]}]}],\"references\":[{\"url\":\"https://nodejs.org/en/blog/vulnerability/december-2025-security-releases\",\"source\":\"support@hackerone.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-59465\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-21T20:10:32.296610Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-21T20:11:10.607Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}}], \"affected\": [{\"vendor\": \"nodejs\", \"product\": \"node\", \"versions\": [{\"status\": \"affected\", \"version\": \"20.19.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"20.19.6\"}, {\"status\": \"affected\", \"version\": \"22.21.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"22.21.1\"}, {\"status\": \"affected\", \"version\": \"24.12.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"24.12.0\"}, {\"status\": \"affected\", \"version\": \"25.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"25.2.1\"}, {\"status\": \"affected\", \"version\": \"4.0\", \"lessThan\": \"4.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.0\", \"lessThan\": \"5.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"6.0\", \"lessThan\": \"6.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"7.0\", \"lessThan\": \"7.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"8.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"9.0\", \"lessThan\": \"9.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"10.0\", \"lessThan\": \"10.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.0\", \"lessThan\": \"11.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"12.0\", \"lessThan\": \"12.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"13.0\", \"lessThan\": \"13.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"14.0\", \"lessThan\": \"14.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"15.0\", \"lessThan\": \"15.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"16.0\", \"lessThan\": \"16.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"17.0\", \"lessThan\": \"17.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"18.0\", \"lessThan\": \"18.*\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://nodejs.org/en/blog/vulnerability/december-2025-security-releases\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\\n```\\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\\n socket.on(\u0027error\u0027, err =\u003e {\\n console.log(err)\\n })\\n})\\n```\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2026-01-20T20:41:55.317Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-59465\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-21T20:11:28.986Z\", \"dateReserved\": \"2025-09-16T15:00:07.875Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2026-01-20T20:41:55.317Z\", \"assignerShortName\": \"hackerone\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
bit-node-2025-59465
Vulnerability from bitnami_vulndb
A malformed HTTP/2 HEADERS frame with oversized, invalid HPACK data can cause Node.js to crash by triggering an unhandled TLSSocket error ECONNRESET. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:
server.on('secureConnection', socket => {
socket.on('error', err => {
console.log(err)
})
})
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "node",
"purl": "pkg:bitnami/node"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "20.20.0"
},
{
"introduced": "21.0.0"
},
{
"fixed": "22.22.0"
},
{
"introduced": "23.0.0"
},
{
"fixed": "24.13.0"
},
{
"introduced": "25.0.0"
},
{
"fixed": "25.3.0"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-59465"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"id": "BIT-node-2025-59465",
"modified": "2026-01-26T15:09:56.435Z",
"published": "2026-01-26T14:47:56.981Z",
"references": [
{
"type": "WEB",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59465"
}
],
"schema_version": "1.6.2"
}
SUSE-SU-2026:0295-1
Vulnerability from csaf_suse - Published: 2026-01-26 13:19 - Updated: 2026-01-26 13:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nodejs22",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nodejs22 fixes the following issues:\n\nSecurity fixes:\n\n- CVE-2026-22036: Fixed unbounded decompression chain in HTTP response leading \n to resource exhaustion (bsc#1256848)\n- CVE-2026-21637: Fixed synchronous exceptions thrown during callbacks that bypass \n TLS error handling and causing denial of service (bsc#1256576)\n- CVE-2025-55132: Fixed futimes() ability to acces file even if process has read \n permissions only (bsc#1256571)\n- CVE-2025-55131: Fixed race condition that allowed allocations with leftover data \n leading to in-process secrets exposure (bsc#1256570)\n- CVE-2025-55130: Fixed filesystem permissions bypass via crafted symlinks (bsc#1256569)\n- CVE-2025-59465: Fixed malformed HTTP/2 HEADERS frame with invalid HPACK leading \n to crash (bsc#1256573)\n- CVE-2025-59466: Fixed uncatchable \u0027Maximum call stack size exceeded\u0027 error \n leading to crash (bsc#1256574)\n\nOther fixes:\n\n- Update to 22.22.0:\n * deps: updated undici to 6.23.0\n * deps: updated bundled c-ares to 1.34.6 (if used)\n * add TLSSocket default error handler\n * disable futimes when permission model is enabled\n * require full read and write to symlink APIs\n * rethrow stack overflow exceptions in async_hooks\n * refactor unsafe buffer creation to remove zero-fill toggle\n * route callback exceptions through error handlers\n\n- Update to 22.21.1:\n * src: avoid unnecessary string -\u003e char* -\u003e string round trips\n * src: remove unnecessary shadowed functions on Utf8Value \u0026 BufferValue\n * process: fix hrtime fast call signatures\n * http: improve writeEarlyHints by avoiding for-of loop\n \n- Update to 22.21.0:\n * cli: add --use-env-proxy\n * http: support http proxy for fetch under NODE_USE_ENV_PROXY\n * http: add shouldUpgradeCallback to let servers control HTTP upgrades\n * http,https: add built-in proxy support in http/https.request and Agent\n * src: add percentage support to --max-old-space-size\n\n- Update to 22.20.0\n * doc: stabilize --disable-sigusr1\n * doc: mark path.matchesGlob as stable\n * http: add Agent.agentKeepAliveTimeoutBuffer option\n * http2: add support for raw header arrays in h2Stream.respond()\n * inspector: add http2 tracking support\n * sea: implement execArgvExtension\n * sea: support execArgv in sea config\n * stream: add brotli support to CompressionStream and DecompressionStream\n * test_runner: support object property mocking\n * worker: add cpu profile APIs for worker\n \n- Update to 22.19.0\n * cli: add NODE_USE_SYSTEM_CA=1\n * cli: support ${pid} placeholder in --cpu-prof-name\n * crypto: add tls.setDefaultCACertificates()\n * dns: support max timeout\n * doc: update the instruction on how to verify releases\n * esm: unflag --experimental-wasm-modules\n * http: add server.keepAliveTimeoutBuffer option\n * lib: docs deprecate _http_*\n * net: update net.blocklist to allow file save and file management\n * process: add threadCpuUsage\n * zlib: add dictionary support to zstdCompress and zstdDecompress\n \n- Update to 22.18.0:\n * deps: update amaro to 1.1.0\n * doc: add all watch-mode related flags to node.1\n * doc: add islandryu to collaborators\n * esm: implement import.meta.main\n * fs: allow correct handling of burst in fs-events with AsyncIterator\n * permission: propagate permission model flags on spawn\n * sqlite: add support for readBigInts option in db connection level\n * src,permission: add support to permission.has(addon)\n * url: add fileURLToPathBuffer API\n * watch: add --watch-kill-signal flag\n * worker: make Worker async disposable\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-295,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-295,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-295,openSUSE-SLE-15.6-2026-295",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0295-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0295-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260295-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0295-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256569",
"url": "https://bugzilla.suse.com/1256569"
},
{
"category": "self",
"summary": "SUSE Bug 1256570",
"url": "https://bugzilla.suse.com/1256570"
},
{
"category": "self",
"summary": "SUSE Bug 1256571",
"url": "https://bugzilla.suse.com/1256571"
},
{
"category": "self",
"summary": "SUSE Bug 1256573",
"url": "https://bugzilla.suse.com/1256573"
},
{
"category": "self",
"summary": "SUSE Bug 1256574",
"url": "https://bugzilla.suse.com/1256574"
},
{
"category": "self",
"summary": "SUSE Bug 1256576",
"url": "https://bugzilla.suse.com/1256576"
},
{
"category": "self",
"summary": "SUSE Bug 1256848",
"url": "https://bugzilla.suse.com/1256848"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55130 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55131 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59465 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59466 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-21637 page",
"url": "https://www.suse.com/security/cve/CVE-2026-21637/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22036 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22036/"
}
],
"title": "Security update for nodejs22",
"tracking": {
"current_release_date": "2026-01-26T13:19:01Z",
"generator": {
"date": "2026-01-26T13:19:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0295-1",
"initial_release_date": "2026-01-26T13:19:01Z",
"revision_history": [
{
"date": "2026-01-26T13:19:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150600.13.12.1.aarch64",
"product": {
"name": "corepack22-22.22.0-150600.13.12.1.aarch64",
"product_id": "corepack22-22.22.0-150600.13.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150600.13.12.1.aarch64",
"product": {
"name": "nodejs22-22.22.0-150600.13.12.1.aarch64",
"product_id": "nodejs22-22.22.0-150600.13.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"product": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"product_id": "nodejs22-devel-22.22.0-150600.13.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150600.13.12.1.aarch64",
"product": {
"name": "npm22-22.22.0-150600.13.12.1.aarch64",
"product_id": "npm22-22.22.0-150600.13.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150600.13.12.1.i586",
"product": {
"name": "corepack22-22.22.0-150600.13.12.1.i586",
"product_id": "corepack22-22.22.0-150600.13.12.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150600.13.12.1.i586",
"product": {
"name": "nodejs22-22.22.0-150600.13.12.1.i586",
"product_id": "nodejs22-22.22.0-150600.13.12.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150600.13.12.1.i586",
"product": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.i586",
"product_id": "nodejs22-devel-22.22.0-150600.13.12.1.i586"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150600.13.12.1.i586",
"product": {
"name": "npm22-22.22.0-150600.13.12.1.i586",
"product_id": "npm22-22.22.0-150600.13.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"product": {
"name": "nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"product_id": "nodejs22-docs-22.22.0-150600.13.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150600.13.12.1.ppc64le",
"product": {
"name": "corepack22-22.22.0-150600.13.12.1.ppc64le",
"product_id": "corepack22-22.22.0-150600.13.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150600.13.12.1.ppc64le",
"product": {
"name": "nodejs22-22.22.0-150600.13.12.1.ppc64le",
"product_id": "nodejs22-22.22.0-150600.13.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"product": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"product_id": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150600.13.12.1.ppc64le",
"product": {
"name": "npm22-22.22.0-150600.13.12.1.ppc64le",
"product_id": "npm22-22.22.0-150600.13.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150600.13.12.1.s390x",
"product": {
"name": "corepack22-22.22.0-150600.13.12.1.s390x",
"product_id": "corepack22-22.22.0-150600.13.12.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150600.13.12.1.s390x",
"product": {
"name": "nodejs22-22.22.0-150600.13.12.1.s390x",
"product_id": "nodejs22-22.22.0-150600.13.12.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"product": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"product_id": "nodejs22-devel-22.22.0-150600.13.12.1.s390x"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150600.13.12.1.s390x",
"product": {
"name": "npm22-22.22.0-150600.13.12.1.s390x",
"product_id": "npm22-22.22.0-150600.13.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150600.13.12.1.x86_64",
"product": {
"name": "corepack22-22.22.0-150600.13.12.1.x86_64",
"product_id": "corepack22-22.22.0-150600.13.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150600.13.12.1.x86_64",
"product": {
"name": "nodejs22-22.22.0-150600.13.12.1.x86_64",
"product_id": "nodejs22-22.22.0-150600.13.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"product": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"product_id": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150600.13.12.1.x86_64",
"product": {
"name": "npm22-22.22.0-150600.13.12.1.x86_64",
"product_id": "npm22-22.22.0-150600.13.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-docs-22.22.0-150600.13.12.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch"
},
"product_reference": "nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-docs-22.22.0-150600.13.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch"
},
"product_reference": "nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack22-22.22.0-150600.13.12.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64"
},
"product_reference": "corepack22-22.22.0-150600.13.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack22-22.22.0-150600.13.12.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "corepack22-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack22-22.22.0-150600.13.12.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x"
},
"product_reference": "corepack22-22.22.0-150600.13.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack22-22.22.0-150600.13.12.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "corepack22-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150600.13.12.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "nodejs22-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-docs-22.22.0-150600.13.12.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch"
},
"product_reference": "nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150600.13.12.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
},
"product_reference": "npm22-22.22.0-150600.13.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55130"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.\nThis vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55130",
"url": "https://www.suse.com/security/cve/CVE-2025-55130"
},
{
"category": "external",
"summary": "SUSE Bug 1256569 for CVE-2025-55130",
"url": "https://bugzilla.suse.com/1256569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:19:01Z",
"details": "important"
}
],
"title": "CVE-2025-55130"
},
{
"cve": "CVE-2025-55131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55131"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55131",
"url": "https://www.suse.com/security/cve/CVE-2025-55131"
},
{
"category": "external",
"summary": "SUSE Bug 1256570 for CVE-2025-55131",
"url": "https://bugzilla.suse.com/1256570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:19:01Z",
"details": "important"
}
],
"title": "CVE-2025-55131"
},
{
"cve": "CVE-2025-55132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55132"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s permission model allows a file\u0027s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55132",
"url": "https://www.suse.com/security/cve/CVE-2025-55132"
},
{
"category": "external",
"summary": "SUSE Bug 1256571 for CVE-2025-55132",
"url": "https://bugzilla.suse.com/1256571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:19:01Z",
"details": "low"
}
],
"title": "CVE-2025-55132"
},
{
"cve": "CVE-2025-59465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59465"
}
],
"notes": [
{
"category": "general",
"text": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59465",
"url": "https://www.suse.com/security/cve/CVE-2025-59465"
},
{
"category": "external",
"summary": "SUSE Bug 1256573 for CVE-2025-59465",
"url": "https://bugzilla.suse.com/1256573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:19:01Z",
"details": "important"
}
],
"title": "CVE-2025-59465"
},
{
"cve": "CVE-2025-59466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59466"
}
],
"notes": [
{
"category": "general",
"text": "We have identified a bug in Node.js error handling where \"Maximum call stack size exceeded\" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(\u0027uncaughtException\u0027)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59466",
"url": "https://www.suse.com/security/cve/CVE-2025-59466"
},
{
"category": "external",
"summary": "SUSE Bug 1256574 for CVE-2025-59466",
"url": "https://bugzilla.suse.com/1256574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:19:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-59466"
},
{
"cve": "CVE-2026-21637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-21637"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-21637",
"url": "https://www.suse.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "SUSE Bug 1256576 for CVE-2026-21637",
"url": "https://bugzilla.suse.com/1256576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:19:01Z",
"details": "moderate"
}
],
"title": "CVE-2026-21637"
},
{
"cve": "CVE-2026-22036",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22036"
}
],
"notes": [
{
"category": "general",
"text": "Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22036",
"url": "https://www.suse.com/security/cve/CVE-2026-22036"
},
{
"category": "external",
"summary": "SUSE Bug 1256843 for CVE-2026-22036",
"url": "https://bugzilla.suse.com/1256843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:npm22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:npm22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:corepack22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:nodejs22-devel-22.22.0-150600.13.12.1.x86_64",
"openSUSE Leap 15.6:nodejs22-docs-22.22.0-150600.13.12.1.noarch",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.aarch64",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.ppc64le",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.s390x",
"openSUSE Leap 15.6:npm22-22.22.0-150600.13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:19:01Z",
"details": "moderate"
}
],
"title": "CVE-2026-22036"
}
]
}
SUSE-SU-2026:0301-1
Vulnerability from csaf_suse - Published: 2026-01-27 08:20 - Updated: 2026-01-27 08:20Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nodejs22",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nodejs22 fixes the following issues:\n \nSecurity fixes:\n\n- CVE-2026-22036: Fixed unbounded decompression chain in HTTP response leading \n to resource exhaustion (bsc#1256848)\n- CVE-2026-21637: Fixed synchronous exceptions thrown during callbacks that bypass \n TLS error handling and causing denial of service (bsc#1256576)\n- CVE-2025-55132: Fixed futimes() ability to acces file even if process has read \n permissions only (bsc#1256571)\n- CVE-2025-55131: Fixed race condition that allowed allocations with leftover data \n leading to in-process secrets exposure (bsc#1256570)\n- CVE-2025-55130: Fixed filesystem permissions bypass via crafted symlinks (bsc#1256569)\n- CVE-2025-59465: Fixed malformed HTTP/2 HEADERS frame with invalid HPACK leading \n to crash (bsc#1256573)\n- CVE-2025-59466: Fixed uncatchable \u0027Maximum call stack size exceeded\u0027 error \n leading to crash (bsc#1256574)\n\nOther fixes:\n\n- Update to 22.22.0:\n * deps: updated undici to 6.23.0\n * deps: updated bundled c-ares to 1.34.6 (if used)\n * add TLSSocket default error handler\n * disable futimes when permission model is enabled\n * require full read and write to symlink APIs\n * rethrow stack overflow exceptions in async_hooks\n * refactor unsafe buffer creation to remove zero-fill toggle\n * route callback exceptions through error handlers\n\n- Update to 22.21.1:\n * src: avoid unnecessary string -\u003e char* -\u003e string round trips\n * src: remove unnecessary shadowed functions on Utf8Value \u0026 BufferValue\n * process: fix hrtime fast call signatures\n * http: improve writeEarlyHints by avoiding for-of loop\n \n- Update to 22.21.0:\n * cli: add --use-env-proxy\n * http: support http proxy for fetch under NODE_USE_ENV_PROXY\n * http: add shouldUpgradeCallback to let servers control HTTP upgrades\n * http,https: add built-in proxy support in http/https.request and Agent\n * src: add percentage support to --max-old-space-size\n\n- Update to 22.20.0\n * doc: stabilize --disable-sigusr1\n * doc: mark path.matchesGlob as stable\n * http: add Agent.agentKeepAliveTimeoutBuffer option\n * http2: add support for raw header arrays in h2Stream.respond()\n * inspector: add http2 tracking support\n * sea: implement execArgvExtension\n * sea: support execArgv in sea config\n * stream: add brotli support to CompressionStream and DecompressionStream\n * test_runner: support object property mocking\n * worker: add cpu profile APIs for worker\n \n- Update to 22.19.0\n * cli: add NODE_USE_SYSTEM_CA=1\n * cli: support ${pid} placeholder in --cpu-prof-name\n * crypto: add tls.setDefaultCACertificates()\n * dns: support max timeout\n * doc: update the instruction on how to verify releases\n * esm: unflag --experimental-wasm-modules\n * http: add server.keepAliveTimeoutBuffer option\n * lib: docs deprecate _http_*\n * net: update net.blocklist to allow file save and file management\n * process: add threadCpuUsage\n * zlib: add dictionary support to zstdCompress and zstdDecompress\n \n- Update to 22.18.0:\n * deps: update amaro to 1.1.0\n * doc: add all watch-mode related flags to node.1\n * doc: add islandryu to collaborators\n * esm: implement import.meta.main\n * fs: allow correct handling of burst in fs-events with AsyncIterator\n * permission: propagate permission model flags on spawn\n * sqlite: add support for readBigInts option in db connection level\n * src,permission: add support to permission.has(addon)\n * url: add fileURLToPathBuffer API\n * watch: add --watch-kill-signal flag\n * worker: make Worker async disposable\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-301,SUSE-SLE-Module-Web-Scripting-15-SP7-2026-301",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0301-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0301-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260301-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0301-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256569",
"url": "https://bugzilla.suse.com/1256569"
},
{
"category": "self",
"summary": "SUSE Bug 1256570",
"url": "https://bugzilla.suse.com/1256570"
},
{
"category": "self",
"summary": "SUSE Bug 1256571",
"url": "https://bugzilla.suse.com/1256571"
},
{
"category": "self",
"summary": "SUSE Bug 1256573",
"url": "https://bugzilla.suse.com/1256573"
},
{
"category": "self",
"summary": "SUSE Bug 1256574",
"url": "https://bugzilla.suse.com/1256574"
},
{
"category": "self",
"summary": "SUSE Bug 1256576",
"url": "https://bugzilla.suse.com/1256576"
},
{
"category": "self",
"summary": "SUSE Bug 1256848",
"url": "https://bugzilla.suse.com/1256848"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55130 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55131 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59465 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59466 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-21637 page",
"url": "https://www.suse.com/security/cve/CVE-2026-21637/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22036 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22036/"
}
],
"title": "Security update for nodejs22",
"tracking": {
"current_release_date": "2026-01-27T08:20:46Z",
"generator": {
"date": "2026-01-27T08:20:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0301-1",
"initial_release_date": "2026-01-27T08:20:46Z",
"revision_history": [
{
"date": "2026-01-27T08:20:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150700.3.6.1.aarch64",
"product": {
"name": "corepack22-22.22.0-150700.3.6.1.aarch64",
"product_id": "corepack22-22.22.0-150700.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150700.3.6.1.aarch64",
"product": {
"name": "nodejs22-22.22.0-150700.3.6.1.aarch64",
"product_id": "nodejs22-22.22.0-150700.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"product": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"product_id": "nodejs22-devel-22.22.0-150700.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150700.3.6.1.aarch64",
"product": {
"name": "npm22-22.22.0-150700.3.6.1.aarch64",
"product_id": "npm22-22.22.0-150700.3.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150700.3.6.1.i586",
"product": {
"name": "corepack22-22.22.0-150700.3.6.1.i586",
"product_id": "corepack22-22.22.0-150700.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150700.3.6.1.i586",
"product": {
"name": "nodejs22-22.22.0-150700.3.6.1.i586",
"product_id": "nodejs22-22.22.0-150700.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150700.3.6.1.i586",
"product": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.i586",
"product_id": "nodejs22-devel-22.22.0-150700.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150700.3.6.1.i586",
"product": {
"name": "npm22-22.22.0-150700.3.6.1.i586",
"product_id": "npm22-22.22.0-150700.3.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"product": {
"name": "nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"product_id": "nodejs22-docs-22.22.0-150700.3.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150700.3.6.1.ppc64le",
"product": {
"name": "corepack22-22.22.0-150700.3.6.1.ppc64le",
"product_id": "corepack22-22.22.0-150700.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150700.3.6.1.ppc64le",
"product": {
"name": "nodejs22-22.22.0-150700.3.6.1.ppc64le",
"product_id": "nodejs22-22.22.0-150700.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"product": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"product_id": "nodejs22-devel-22.22.0-150700.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150700.3.6.1.ppc64le",
"product": {
"name": "npm22-22.22.0-150700.3.6.1.ppc64le",
"product_id": "npm22-22.22.0-150700.3.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150700.3.6.1.s390x",
"product": {
"name": "corepack22-22.22.0-150700.3.6.1.s390x",
"product_id": "corepack22-22.22.0-150700.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150700.3.6.1.s390x",
"product": {
"name": "nodejs22-22.22.0-150700.3.6.1.s390x",
"product_id": "nodejs22-22.22.0-150700.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"product": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"product_id": "nodejs22-devel-22.22.0-150700.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150700.3.6.1.s390x",
"product": {
"name": "npm22-22.22.0-150700.3.6.1.s390x",
"product_id": "npm22-22.22.0-150700.3.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-150700.3.6.1.x86_64",
"product": {
"name": "corepack22-22.22.0-150700.3.6.1.x86_64",
"product_id": "corepack22-22.22.0-150700.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-150700.3.6.1.x86_64",
"product": {
"name": "nodejs22-22.22.0-150700.3.6.1.x86_64",
"product_id": "nodejs22-22.22.0-150700.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"product": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"product_id": "nodejs22-devel-22.22.0-150700.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-150700.3.6.1.x86_64",
"product": {
"name": "npm22-22.22.0-150700.3.6.1.x86_64",
"product_id": "npm22-22.22.0-150700.3.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150700.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64"
},
"product_reference": "nodejs22-22.22.0-150700.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150700.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le"
},
"product_reference": "nodejs22-22.22.0-150700.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150700.3.6.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x"
},
"product_reference": "nodejs22-22.22.0-150700.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-150700.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64"
},
"product_reference": "nodejs22-22.22.0-150700.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64"
},
"product_reference": "nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le"
},
"product_reference": "nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x"
},
"product_reference": "nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-150700.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64"
},
"product_reference": "nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-docs-22.22.0-150700.3.6.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch"
},
"product_reference": "nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150700.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64"
},
"product_reference": "npm22-22.22.0-150700.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150700.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le"
},
"product_reference": "npm22-22.22.0-150700.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150700.3.6.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x"
},
"product_reference": "npm22-22.22.0-150700.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-150700.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
},
"product_reference": "npm22-22.22.0-150700.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55130"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.\nThis vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55130",
"url": "https://www.suse.com/security/cve/CVE-2025-55130"
},
{
"category": "external",
"summary": "SUSE Bug 1256569 for CVE-2025-55130",
"url": "https://bugzilla.suse.com/1256569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T08:20:46Z",
"details": "important"
}
],
"title": "CVE-2025-55130"
},
{
"cve": "CVE-2025-55131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55131"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55131",
"url": "https://www.suse.com/security/cve/CVE-2025-55131"
},
{
"category": "external",
"summary": "SUSE Bug 1256570 for CVE-2025-55131",
"url": "https://bugzilla.suse.com/1256570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T08:20:46Z",
"details": "important"
}
],
"title": "CVE-2025-55131"
},
{
"cve": "CVE-2025-55132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55132"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s permission model allows a file\u0027s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55132",
"url": "https://www.suse.com/security/cve/CVE-2025-55132"
},
{
"category": "external",
"summary": "SUSE Bug 1256571 for CVE-2025-55132",
"url": "https://bugzilla.suse.com/1256571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T08:20:46Z",
"details": "low"
}
],
"title": "CVE-2025-55132"
},
{
"cve": "CVE-2025-59465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59465"
}
],
"notes": [
{
"category": "general",
"text": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59465",
"url": "https://www.suse.com/security/cve/CVE-2025-59465"
},
{
"category": "external",
"summary": "SUSE Bug 1256573 for CVE-2025-59465",
"url": "https://bugzilla.suse.com/1256573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T08:20:46Z",
"details": "important"
}
],
"title": "CVE-2025-59465"
},
{
"cve": "CVE-2025-59466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59466"
}
],
"notes": [
{
"category": "general",
"text": "We have identified a bug in Node.js error handling where \"Maximum call stack size exceeded\" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(\u0027uncaughtException\u0027)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59466",
"url": "https://www.suse.com/security/cve/CVE-2025-59466"
},
{
"category": "external",
"summary": "SUSE Bug 1256574 for CVE-2025-59466",
"url": "https://bugzilla.suse.com/1256574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T08:20:46Z",
"details": "moderate"
}
],
"title": "CVE-2025-59466"
},
{
"cve": "CVE-2026-21637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-21637"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-21637",
"url": "https://www.suse.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "SUSE Bug 1256576 for CVE-2026-21637",
"url": "https://bugzilla.suse.com/1256576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T08:20:46Z",
"details": "moderate"
}
],
"title": "CVE-2026-21637"
},
{
"cve": "CVE-2026-22036",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22036"
}
],
"notes": [
{
"category": "general",
"text": "Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22036",
"url": "https://www.suse.com/security/cve/CVE-2026-22036"
},
{
"category": "external",
"summary": "SUSE Bug 1256843 for CVE-2026-22036",
"url": "https://bugzilla.suse.com/1256843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-devel-22.22.0-150700.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:nodejs22-docs-22.22.0-150700.3.6.1.noarch",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 15 SP7:npm22-22.22.0-150700.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-27T08:20:46Z",
"details": "moderate"
}
],
"title": "CVE-2026-22036"
}
]
}
RHSA-2026:1842
Vulnerability from csaf_redhat - Published: 2026-02-05 16:03 - Updated: 2026-02-05 20:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nodejs24 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a platform built on Chrome\u0027s JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.\n\nSecurity Fix(es):\n\n* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)\n\n* nodejs: Nodejs denial of service (CVE-2026-21637)\n\n* nodejs: Nodejs denial of service (CVE-2025-59466)\n\n* nodejs: Nodejs denial of service (CVE-2025-59465)\n\n* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)\n\n* nodejs: Nodejs file permissions bypass (CVE-2025-55130)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1842",
"url": "https://access.redhat.com/errata/RHSA-2026:1842"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2431338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431338"
},
{
"category": "external",
"summary": "2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "2431343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431343"
},
{
"category": "external",
"summary": "2431349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431349"
},
{
"category": "external",
"summary": "2431350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431350"
},
{
"category": "external",
"summary": "2431352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431352"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1842.json"
}
],
"title": "Red Hat Security Advisory: nodejs24 security update",
"tracking": {
"current_release_date": "2026-02-05T20:05:39+00:00",
"generator": {
"date": "2026-02-05T20:05:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1842",
"initial_release_date": "2026-02-05T16:03:11+00:00",
"revision_history": [
{
"date": "2026-02-05T16:03:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T16:03:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-05T20:05:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.13.0-1.el10_1.src",
"product": {
"name": "nodejs24-1:24.13.0-1.el10_1.src",
"product_id": "nodejs24-1:24.13.0-1.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.13.0-1.el10_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.13.0-1.el10_1.aarch64",
"product": {
"name": "nodejs24-1:24.13.0-1.el10_1.aarch64",
"product_id": "nodejs24-1:24.13.0-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.13.0-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"product": {
"name": "nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"product_id": "nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-devel@24.13.0-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"product": {
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"product_id": "nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-full-i18n@24.13.0-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"product": {
"name": "nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"product_id": "nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs@24.13.0-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"product": {
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"product_id": "nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debugsource@24.13.0-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"product": {
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"product_id": "nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debuginfo@24.13.0-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"product": {
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"product_id": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs-debuginfo@24.13.0-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.13.0-1.el10_1.ppc64le",
"product": {
"name": "nodejs24-1:24.13.0-1.el10_1.ppc64le",
"product_id": "nodejs24-1:24.13.0-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.13.0-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"product": {
"name": "nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"product_id": "nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-devel@24.13.0-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"product": {
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"product_id": "nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-full-i18n@24.13.0-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"product": {
"name": "nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"product_id": "nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs@24.13.0-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"product": {
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"product_id": "nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debugsource@24.13.0-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"product": {
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"product_id": "nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debuginfo@24.13.0-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"product": {
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"product_id": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs-debuginfo@24.13.0-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.13.0-1.el10_1.x86_64",
"product": {
"name": "nodejs24-1:24.13.0-1.el10_1.x86_64",
"product_id": "nodejs24-1:24.13.0-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.13.0-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"product": {
"name": "nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"product_id": "nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-devel@24.13.0-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"product": {
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"product_id": "nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-full-i18n@24.13.0-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"product": {
"name": "nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"product_id": "nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs@24.13.0-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"product": {
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"product_id": "nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debugsource@24.13.0-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"product": {
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"product_id": "nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debuginfo@24.13.0-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"product": {
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"product_id": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs-debuginfo@24.13.0-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.13.0-1.el10_1.s390x",
"product": {
"name": "nodejs24-1:24.13.0-1.el10_1.s390x",
"product_id": "nodejs24-1:24.13.0-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.13.0-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"product": {
"name": "nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"product_id": "nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-devel@24.13.0-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"product": {
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"product_id": "nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-full-i18n@24.13.0-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"product": {
"name": "nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"product_id": "nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs@24.13.0-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"product": {
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"product_id": "nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debugsource@24.13.0-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"product": {
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"product_id": "nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debuginfo@24.13.0-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"product": {
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"product_id": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs-debuginfo@24.13.0-1.el10_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"product": {
"name": "nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"product_id": "nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-docs@24.13.0-1.el10_1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch",
"product": {
"name": "nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch",
"product_id": "nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-npm@11.6.2-1.24.13.0.1.el10_1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.13.0-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64"
},
"product_reference": "nodejs24-1:24.13.0-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.13.0-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le"
},
"product_reference": "nodejs24-1:24.13.0-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.13.0-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x"
},
"product_reference": "nodejs24-1:24.13.0-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.13.0-1.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src"
},
"product_reference": "nodejs24-1:24.13.0-1.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.13.0-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64"
},
"product_reference": "nodejs24-1:24.13.0-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64"
},
"product_reference": "nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le"
},
"product_reference": "nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x"
},
"product_reference": "nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64"
},
"product_reference": "nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64"
},
"product_reference": "nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le"
},
"product_reference": "nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x"
},
"product_reference": "nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64"
},
"product_reference": "nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-1:24.13.0-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64"
},
"product_reference": "nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-1:24.13.0-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le"
},
"product_reference": "nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-1:24.13.0-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x"
},
"product_reference": "nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-1:24.13.0-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64"
},
"product_reference": "nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-docs-1:24.13.0-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch"
},
"product_reference": "nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64"
},
"product_reference": "nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le"
},
"product_reference": "nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x"
},
"product_reference": "nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64"
},
"product_reference": "nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-1:24.13.0-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64"
},
"product_reference": "nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-1:24.13.0-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le"
},
"product_reference": "nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-1:24.13.0-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x"
},
"product_reference": "nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-1:24.13.0-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64"
},
"product_reference": "nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64"
},
"product_reference": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le"
},
"product_reference": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x"
},
"product_reference": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64"
},
"product_reference": "nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
},
"product_reference": "nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55130",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2026-01-20T21:03:01.083023+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431352"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u2019s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.\nThis vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs file permissions bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55130"
},
{
"category": "external",
"summary": "RHBZ#2431352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431352"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55130",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55130"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.393000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1842"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs file permissions bypass"
},
{
"cve": "CVE-2025-55131",
"cwe": {
"id": "CWE-497",
"name": "Exposure of Sensitive System Information to an Unauthorized Control Sphere"
},
"discovery_date": "2026-01-20T21:02:45.759578+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431350"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u0027s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs uninitialized memory exposure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55131"
},
{
"category": "external",
"summary": "RHBZ#2431350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55131"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.591000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1842"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs uninitialized memory exposure"
},
{
"cve": "CVE-2025-55132",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2026-01-20T21:01:12.192484+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u0027s permission model allows a file\u0027s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs filesystem permissions bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55132"
},
{
"category": "external",
"summary": "RHBZ#2431338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55132",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55132"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.620000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1842"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: Nodejs filesystem permissions bypass"
},
{
"cve": "CVE-2025-59465",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:02:37.799525+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431349"
}
],
"notes": [
{
"category": "description",
"text": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59465"
},
{
"category": "external",
"summary": "RHBZ#2431349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59465"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.317000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1842"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2025-59466",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-20T21:01:46.025710+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431343"
}
],
"notes": [
{
"category": "description",
"text": "We have identified a bug in Node.js error handling where \"Maximum call stack size exceeded\" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(\u0027uncaughtException\u0027)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59466"
},
{
"category": "external",
"summary": "RHBZ#2431343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431343"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59466"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.628000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1842"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2026-21637",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:01:26.738343+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "RHBZ#2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.352000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1842"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.13.0-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.13.0-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.6.2-1.24.13.0.1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
}
]
}
RHSA-2026:1843
Vulnerability from csaf_redhat - Published: 2026-02-05 16:03 - Updated: 2026-02-05 16:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nodejs22 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a platform built on Chrome\u0027s JavaScript runtime \\ for easily building fast, scalable network applications. \\ Node.js uses an event-driven, non-blocking I/O model that \\ makes it lightweight and efficient, perfect for data-intensive \\ real-time applications that run across distributed devices.\n\nSecurity Fix(es):\n\n* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)\n\n* nodejs: Nodejs denial of service (CVE-2026-21637)\n\n* nodejs: Nodejs denial of service (CVE-2025-59466)\n\n* nodejs: Nodejs denial of service (CVE-2025-59465)\n\n* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)\n\n* nodejs: Nodejs file permissions bypass (CVE-2025-55130)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1843",
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2431338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431338"
},
{
"category": "external",
"summary": "2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "2431343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431343"
},
{
"category": "external",
"summary": "2431349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431349"
},
{
"category": "external",
"summary": "2431350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431350"
},
{
"category": "external",
"summary": "2431352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431352"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1843.json"
}
],
"title": "Red Hat Security Advisory: nodejs22 security update",
"tracking": {
"current_release_date": "2026-02-05T16:04:03+00:00",
"generator": {
"date": "2026-02-05T16:04:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1843",
"initial_release_date": "2026-02-05T16:03:36+00:00",
"revision_history": [
{
"date": "2026-02-05T16:03:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T16:03:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-05T16:04:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"product": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"product_id": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.4-1.22.22.0.3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"product": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"product_id": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.4-1.22.22.0.3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-devel-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-libs-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"product": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"product_id": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.4-1.22.22.0.3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"product": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"product_id": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.4-1.22.22.0.3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:22.22.0-3.el10_1.noarch",
"product": {
"name": "nodejs-docs-1:22.22.0-3.el10_1.noarch",
"product_id": "nodejs-docs-1:22.22.0-3.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@22.22.0-3.el10_1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs22-1:22.22.0-3.el10_1.src",
"product": {
"name": "nodejs22-1:22.22.0-3.el10_1.src",
"product_id": "nodejs22-1:22.22.0-3.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22@22.22.0-3.el10_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-devel-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:22.22.0-3.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch"
},
"product_reference": "nodejs-docs-1:22.22.0-3.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-libs-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64"
},
"product_reference": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le"
},
"product_reference": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x"
},
"product_reference": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64"
},
"product_reference": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-1:22.22.0-3.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src"
},
"product_reference": "nodejs22-1:22.22.0-3.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55130",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2026-01-20T21:03:01.083023+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431352"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u2019s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.\nThis vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs file permissions bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55130"
},
{
"category": "external",
"summary": "RHBZ#2431352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431352"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55130",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55130"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.393000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs file permissions bypass"
},
{
"cve": "CVE-2025-55131",
"cwe": {
"id": "CWE-497",
"name": "Exposure of Sensitive System Information to an Unauthorized Control Sphere"
},
"discovery_date": "2026-01-20T21:02:45.759578+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431350"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u0027s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs uninitialized memory exposure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55131"
},
{
"category": "external",
"summary": "RHBZ#2431350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55131"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.591000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs uninitialized memory exposure"
},
{
"cve": "CVE-2025-55132",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2026-01-20T21:01:12.192484+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u0027s permission model allows a file\u0027s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs filesystem permissions bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55132"
},
{
"category": "external",
"summary": "RHBZ#2431338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55132",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55132"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.620000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: Nodejs filesystem permissions bypass"
},
{
"cve": "CVE-2025-59465",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:02:37.799525+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431349"
}
],
"notes": [
{
"category": "description",
"text": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59465"
},
{
"category": "external",
"summary": "RHBZ#2431349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59465"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.317000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2025-59466",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-20T21:01:46.025710+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431343"
}
],
"notes": [
{
"category": "description",
"text": "We have identified a bug in Node.js error handling where \"Maximum call stack size exceeded\" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(\u0027uncaughtException\u0027)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59466"
},
{
"category": "external",
"summary": "RHBZ#2431343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431343"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59466"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.628000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2026-21637",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:01:26.738343+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "RHBZ#2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.352000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
}
]
}
WID-SEC-W-2026-0098
Vulnerability from csaf_certbund - Published: 2026-01-13 23:00 - Updated: 2026-02-04 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Code auszuf\u00fchren, erweiterte Berechtigungen zu erlangen, Sicherheitsma\u00dfnahmen zu umgehen, Daten zu manipulieren und vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0098 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0098.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0098 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0098"
},
{
"category": "external",
"summary": "NodeJS Security Release vom 2026-01-13",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0295-1 vom 2026-01-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNEEHSNPEIHXCGDJ2EAF4CD5OEXEYCQU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0301-1 vom 2026-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html"
},
{
"category": "external",
"summary": "Exploit CVE-2025-55130 vom 2026-02-01",
"url": "https://github.com/scumfrog/CVE-2025-55130"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1843 vom 2026-02-05",
"url": "https://linux.oracle.com/errata/ELSA-2026-1843.html"
}
],
"source_lang": "en-US",
"title": "Node.js: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-04T23:00:00.000+00:00",
"generator": {
"date": "2026-02-05T09:39:41.201+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0098",
"initial_release_date": "2026-01-13T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2026-3331, EUVD-2026-3327, EUVD-2026-3325, EUVD-2026-3323, EUVD-2026-3340, EUVD-2026-3339, EUVD-2026-3338"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: EUVD-2026-3334"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "6",
"summary": "Exploit f\u00fcr CVE-2025-55130 aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.20.0",
"product": {
"name": "Open Source Node.js \u003c20.20.0",
"product_id": "T049912"
}
},
{
"category": "product_version",
"name": "20.20.0",
"product": {
"name": "Open Source Node.js 20.20.0",
"product_id": "T049912-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:20.20.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c22.22.0",
"product": {
"name": "Open Source Node.js \u003c22.22.0",
"product_id": "T049913"
}
},
{
"category": "product_version",
"name": "22.22.0",
"product": {
"name": "Open Source Node.js 22.22.0",
"product_id": "T049913-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:22.22.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c24.13.0",
"product": {
"name": "Open Source Node.js \u003c24.13.0",
"product_id": "T049914"
}
},
{
"category": "product_version",
"name": "24.13.0",
"product": {
"name": "Open Source Node.js 24.13.0",
"product_id": "T049914-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:24.13.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c25.3.0",
"product": {
"name": "Open Source Node.js \u003c25.3.0",
"product_id": "T049915"
}
},
{
"category": "product_version",
"name": "25.3.0",
"product": {
"name": "Open Source Node.js 25.3.0",
"product_id": "T049915-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:25.3.0"
}
}
}
],
"category": "product_name",
"name": "Node.js"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55130",
"product_status": {
"known_affected": [
"T049914",
"T049913",
"T049912",
"T002207",
"T049915",
"T004914"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-55130"
},
{
"cve": "CVE-2025-55131",
"product_status": {
"known_affected": [
"T049914",
"T049913",
"T049912",
"T002207",
"T049915",
"T004914"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-55131"
},
{
"cve": "CVE-2025-55132",
"product_status": {
"known_affected": [
"T049914",
"T049913",
"T049912",
"T002207",
"T049915",
"T004914"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-55132"
},
{
"cve": "CVE-2025-59464",
"product_status": {
"known_affected": [
"T049914",
"T049913",
"T049912",
"T002207",
"T049915",
"T004914"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-59464"
},
{
"cve": "CVE-2025-59465",
"product_status": {
"known_affected": [
"T049914",
"T049913",
"T049912",
"T002207",
"T049915",
"T004914"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-59465"
},
{
"cve": "CVE-2025-59466",
"product_status": {
"known_affected": [
"T049914",
"T049913",
"T049912",
"T002207",
"T049915",
"T004914"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-59466"
},
{
"cve": "CVE-2026-21636",
"product_status": {
"known_affected": [
"T049914",
"T049913",
"T049912",
"T002207",
"T049915",
"T004914"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2026-21636"
},
{
"cve": "CVE-2026-21637",
"product_status": {
"known_affected": [
"T049914",
"T049913",
"T049912",
"T002207",
"T049915",
"T004914"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2026-21637"
}
]
}
GHSA-W2PG-HW7V-F7M9
Vulnerability from github – Published: 2026-01-20 21:31 – Updated: 2026-01-20 21:31A malformed HTTP/2 HEADERS frame with oversized, invalid HPACK data can cause Node.js to crash by triggering an unhandled TLSSocket error ECONNRESET. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:
server.on('secureConnection', socket => {
socket.on('error', err => {
console.log(err)
})
})
{
"affected": [],
"aliases": [
"CVE-2025-59465"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-20T21:16:04Z",
"severity": "HIGH"
},
"details": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"id": "GHSA-w2pg-hw7v-f7m9",
"modified": "2026-01-20T21:31:35Z",
"published": "2026-01-20T21:31:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59465"
},
{
"type": "WEB",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-59465
Vulnerability from fkie_nvd - Published: 2026-01-20 21:16 - Updated: 2026-01-30 20:25| URL | Tags | ||
|---|---|---|---|
| support@hackerone.com | https://nodejs.org/en/blog/vulnerability/december-2025-security-releases | Release Notes, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "A78B4AE9-C1B4-4DD0-9EDF-A3A60431B6DA",
"versionEndExcluding": "20.20.0",
"versionStartIncluding": "20.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "132A7510-B3E9-4F85-9B61-A834B12DD7D7",
"versionEndExcluding": "22.22.0",
"versionStartIncluding": "22.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "A83233BD-D901-4A1A-A3AF-0DC3E76CD2C0",
"versionEndExcluding": "24.13.0",
"versionStartIncluding": "24.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "970EF154-D905-4FDA-85CB-C3AB08BEFAEC",
"versionEndExcluding": "25.3.0",
"versionStartIncluding": "25.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```"
}
],
"id": "CVE-2025-59465",
"lastModified": "2026-01-30T20:25:39.890",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "support@hackerone.com",
"type": "Secondary"
}
]
},
"published": "2026-01-20T21:16:04.010",
"references": [
{
"source": "support@hackerone.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
OPENSUSE-SU-2026:10074-1
Vulnerability from csaf_opensuse - Published: 2026-01-21 00:00 - Updated: 2026-01-21 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "corepack22-22.22.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the corepack22-22.22.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10074",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10074-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55130 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55131 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59465 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59466 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-21637 page",
"url": "https://www.suse.com/security/cve/CVE-2026-21637/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22036 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22036/"
}
],
"title": "corepack22-22.22.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-21T00:00:00Z",
"generator": {
"date": "2026-01-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10074-1",
"initial_release_date": "2026-01-21T00:00:00Z",
"revision_history": [
{
"date": "2026-01-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-1.1.aarch64",
"product": {
"name": "corepack22-22.22.0-1.1.aarch64",
"product_id": "corepack22-22.22.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-1.1.aarch64",
"product": {
"name": "nodejs22-22.22.0-1.1.aarch64",
"product_id": "nodejs22-22.22.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-1.1.aarch64",
"product": {
"name": "nodejs22-devel-22.22.0-1.1.aarch64",
"product_id": "nodejs22-devel-22.22.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs22-docs-22.22.0-1.1.aarch64",
"product": {
"name": "nodejs22-docs-22.22.0-1.1.aarch64",
"product_id": "nodejs22-docs-22.22.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-1.1.aarch64",
"product": {
"name": "npm22-22.22.0-1.1.aarch64",
"product_id": "npm22-22.22.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-1.1.ppc64le",
"product": {
"name": "corepack22-22.22.0-1.1.ppc64le",
"product_id": "corepack22-22.22.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-1.1.ppc64le",
"product": {
"name": "nodejs22-22.22.0-1.1.ppc64le",
"product_id": "nodejs22-22.22.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-1.1.ppc64le",
"product": {
"name": "nodejs22-devel-22.22.0-1.1.ppc64le",
"product_id": "nodejs22-devel-22.22.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs22-docs-22.22.0-1.1.ppc64le",
"product": {
"name": "nodejs22-docs-22.22.0-1.1.ppc64le",
"product_id": "nodejs22-docs-22.22.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-1.1.ppc64le",
"product": {
"name": "npm22-22.22.0-1.1.ppc64le",
"product_id": "npm22-22.22.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-1.1.s390x",
"product": {
"name": "corepack22-22.22.0-1.1.s390x",
"product_id": "corepack22-22.22.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-1.1.s390x",
"product": {
"name": "nodejs22-22.22.0-1.1.s390x",
"product_id": "nodejs22-22.22.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-1.1.s390x",
"product": {
"name": "nodejs22-devel-22.22.0-1.1.s390x",
"product_id": "nodejs22-devel-22.22.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs22-docs-22.22.0-1.1.s390x",
"product": {
"name": "nodejs22-docs-22.22.0-1.1.s390x",
"product_id": "nodejs22-docs-22.22.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-1.1.s390x",
"product": {
"name": "npm22-22.22.0-1.1.s390x",
"product_id": "npm22-22.22.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack22-22.22.0-1.1.x86_64",
"product": {
"name": "corepack22-22.22.0-1.1.x86_64",
"product_id": "corepack22-22.22.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs22-22.22.0-1.1.x86_64",
"product": {
"name": "nodejs22-22.22.0-1.1.x86_64",
"product_id": "nodejs22-22.22.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs22-devel-22.22.0-1.1.x86_64",
"product": {
"name": "nodejs22-devel-22.22.0-1.1.x86_64",
"product_id": "nodejs22-devel-22.22.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs22-docs-22.22.0-1.1.x86_64",
"product": {
"name": "nodejs22-docs-22.22.0-1.1.x86_64",
"product_id": "nodejs22-docs-22.22.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm22-22.22.0-1.1.x86_64",
"product": {
"name": "npm22-22.22.0-1.1.x86_64",
"product_id": "npm22-22.22.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack22-22.22.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64"
},
"product_reference": "corepack22-22.22.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack22-22.22.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le"
},
"product_reference": "corepack22-22.22.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack22-22.22.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x"
},
"product_reference": "corepack22-22.22.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack22-22.22.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64"
},
"product_reference": "corepack22-22.22.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64"
},
"product_reference": "nodejs22-22.22.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le"
},
"product_reference": "nodejs22-22.22.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x"
},
"product_reference": "nodejs22-22.22.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-22.22.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64"
},
"product_reference": "nodejs22-22.22.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64"
},
"product_reference": "nodejs22-devel-22.22.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le"
},
"product_reference": "nodejs22-devel-22.22.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x"
},
"product_reference": "nodejs22-devel-22.22.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-devel-22.22.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64"
},
"product_reference": "nodejs22-devel-22.22.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-docs-22.22.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64"
},
"product_reference": "nodejs22-docs-22.22.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-docs-22.22.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le"
},
"product_reference": "nodejs22-docs-22.22.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-docs-22.22.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x"
},
"product_reference": "nodejs22-docs-22.22.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-docs-22.22.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64"
},
"product_reference": "nodejs22-docs-22.22.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64"
},
"product_reference": "npm22-22.22.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le"
},
"product_reference": "npm22-22.22.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x"
},
"product_reference": "npm22-22.22.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm22-22.22.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
},
"product_reference": "npm22-22.22.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55130"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.\nThis vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55130",
"url": "https://www.suse.com/security/cve/CVE-2025-55130"
},
{
"category": "external",
"summary": "SUSE Bug 1256569 for CVE-2025-55130",
"url": "https://bugzilla.suse.com/1256569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-55130"
},
{
"cve": "CVE-2025-55131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55131"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55131",
"url": "https://www.suse.com/security/cve/CVE-2025-55131"
},
{
"category": "external",
"summary": "SUSE Bug 1256570 for CVE-2025-55131",
"url": "https://bugzilla.suse.com/1256570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-55131"
},
{
"cve": "CVE-2025-55132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55132"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s permission model allows a file\u0027s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55132",
"url": "https://www.suse.com/security/cve/CVE-2025-55132"
},
{
"category": "external",
"summary": "SUSE Bug 1256571 for CVE-2025-55132",
"url": "https://bugzilla.suse.com/1256571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-55132"
},
{
"cve": "CVE-2025-59465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59465"
}
],
"notes": [
{
"category": "general",
"text": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59465",
"url": "https://www.suse.com/security/cve/CVE-2025-59465"
},
{
"category": "external",
"summary": "SUSE Bug 1256573 for CVE-2025-59465",
"url": "https://bugzilla.suse.com/1256573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-59465"
},
{
"cve": "CVE-2025-59466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59466"
}
],
"notes": [
{
"category": "general",
"text": "We have identified a bug in Node.js error handling where \"Maximum call stack size exceeded\" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(\u0027uncaughtException\u0027)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59466",
"url": "https://www.suse.com/security/cve/CVE-2025-59466"
},
{
"category": "external",
"summary": "SUSE Bug 1256574 for CVE-2025-59466",
"url": "https://bugzilla.suse.com/1256574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59466"
},
{
"cve": "CVE-2026-21637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-21637"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-21637",
"url": "https://www.suse.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "SUSE Bug 1256576 for CVE-2026-21637",
"url": "https://bugzilla.suse.com/1256576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-21637"
},
{
"cve": "CVE-2026-22036",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22036"
}
],
"notes": [
{
"category": "general",
"text": "Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22036",
"url": "https://www.suse.com/security/cve/CVE-2026-22036"
},
{
"category": "external",
"summary": "SUSE Bug 1256843 for CVE-2026-22036",
"url": "https://bugzilla.suse.com/1256843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:corepack22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-devel-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs22-docs-22.22.0-1.1.x86_64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.aarch64",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.s390x",
"openSUSE Tumbleweed:npm22-22.22.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-22036"
}
]
}
OPENSUSE-SU-2026:10062-1
Vulnerability from csaf_opensuse - Published: 2026-01-17 00:00 - Updated: 2026-01-17 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "corepack24-24.13.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the corepack24-24.13.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10062",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10062-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55130 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55131 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59465 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59466 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-21637 page",
"url": "https://www.suse.com/security/cve/CVE-2026-21637/"
}
],
"title": "corepack24-24.13.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-17T00:00:00Z",
"generator": {
"date": "2026-01-17T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10062-1",
"initial_release_date": "2026-01-17T00:00:00Z",
"revision_history": [
{
"date": "2026-01-17T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "corepack24-24.13.0-1.1.aarch64",
"product": {
"name": "corepack24-24.13.0-1.1.aarch64",
"product_id": "corepack24-24.13.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs24-24.13.0-1.1.aarch64",
"product": {
"name": "nodejs24-24.13.0-1.1.aarch64",
"product_id": "nodejs24-24.13.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs24-devel-24.13.0-1.1.aarch64",
"product": {
"name": "nodejs24-devel-24.13.0-1.1.aarch64",
"product_id": "nodejs24-devel-24.13.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "nodejs24-docs-24.13.0-1.1.aarch64",
"product": {
"name": "nodejs24-docs-24.13.0-1.1.aarch64",
"product_id": "nodejs24-docs-24.13.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "npm24-24.13.0-1.1.aarch64",
"product": {
"name": "npm24-24.13.0-1.1.aarch64",
"product_id": "npm24-24.13.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack24-24.13.0-1.1.ppc64le",
"product": {
"name": "corepack24-24.13.0-1.1.ppc64le",
"product_id": "corepack24-24.13.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs24-24.13.0-1.1.ppc64le",
"product": {
"name": "nodejs24-24.13.0-1.1.ppc64le",
"product_id": "nodejs24-24.13.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs24-devel-24.13.0-1.1.ppc64le",
"product": {
"name": "nodejs24-devel-24.13.0-1.1.ppc64le",
"product_id": "nodejs24-devel-24.13.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nodejs24-docs-24.13.0-1.1.ppc64le",
"product": {
"name": "nodejs24-docs-24.13.0-1.1.ppc64le",
"product_id": "nodejs24-docs-24.13.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "npm24-24.13.0-1.1.ppc64le",
"product": {
"name": "npm24-24.13.0-1.1.ppc64le",
"product_id": "npm24-24.13.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack24-24.13.0-1.1.s390x",
"product": {
"name": "corepack24-24.13.0-1.1.s390x",
"product_id": "corepack24-24.13.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs24-24.13.0-1.1.s390x",
"product": {
"name": "nodejs24-24.13.0-1.1.s390x",
"product_id": "nodejs24-24.13.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs24-devel-24.13.0-1.1.s390x",
"product": {
"name": "nodejs24-devel-24.13.0-1.1.s390x",
"product_id": "nodejs24-devel-24.13.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "nodejs24-docs-24.13.0-1.1.s390x",
"product": {
"name": "nodejs24-docs-24.13.0-1.1.s390x",
"product_id": "nodejs24-docs-24.13.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "npm24-24.13.0-1.1.s390x",
"product": {
"name": "npm24-24.13.0-1.1.s390x",
"product_id": "npm24-24.13.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "corepack24-24.13.0-1.1.x86_64",
"product": {
"name": "corepack24-24.13.0-1.1.x86_64",
"product_id": "corepack24-24.13.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs24-24.13.0-1.1.x86_64",
"product": {
"name": "nodejs24-24.13.0-1.1.x86_64",
"product_id": "nodejs24-24.13.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs24-devel-24.13.0-1.1.x86_64",
"product": {
"name": "nodejs24-devel-24.13.0-1.1.x86_64",
"product_id": "nodejs24-devel-24.13.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "nodejs24-docs-24.13.0-1.1.x86_64",
"product": {
"name": "nodejs24-docs-24.13.0-1.1.x86_64",
"product_id": "nodejs24-docs-24.13.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "npm24-24.13.0-1.1.x86_64",
"product": {
"name": "npm24-24.13.0-1.1.x86_64",
"product_id": "npm24-24.13.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack24-24.13.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64"
},
"product_reference": "corepack24-24.13.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack24-24.13.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le"
},
"product_reference": "corepack24-24.13.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack24-24.13.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x"
},
"product_reference": "corepack24-24.13.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "corepack24-24.13.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64"
},
"product_reference": "corepack24-24.13.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-24.13.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64"
},
"product_reference": "nodejs24-24.13.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-24.13.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le"
},
"product_reference": "nodejs24-24.13.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-24.13.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x"
},
"product_reference": "nodejs24-24.13.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-24.13.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64"
},
"product_reference": "nodejs24-24.13.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-24.13.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64"
},
"product_reference": "nodejs24-devel-24.13.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-24.13.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le"
},
"product_reference": "nodejs24-devel-24.13.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-24.13.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x"
},
"product_reference": "nodejs24-devel-24.13.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-24.13.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64"
},
"product_reference": "nodejs24-devel-24.13.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-docs-24.13.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64"
},
"product_reference": "nodejs24-docs-24.13.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-docs-24.13.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le"
},
"product_reference": "nodejs24-docs-24.13.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-docs-24.13.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x"
},
"product_reference": "nodejs24-docs-24.13.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-docs-24.13.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64"
},
"product_reference": "nodejs24-docs-24.13.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm24-24.13.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64"
},
"product_reference": "npm24-24.13.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm24-24.13.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le"
},
"product_reference": "npm24-24.13.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm24-24.13.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x"
},
"product_reference": "npm24-24.13.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm24-24.13.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
},
"product_reference": "npm24-24.13.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55130"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.\nThis vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55130",
"url": "https://www.suse.com/security/cve/CVE-2025-55130"
},
{
"category": "external",
"summary": "SUSE Bug 1256569 for CVE-2025-55130",
"url": "https://bugzilla.suse.com/1256569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-55130"
},
{
"cve": "CVE-2025-55131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55131"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55131",
"url": "https://www.suse.com/security/cve/CVE-2025-55131"
},
{
"category": "external",
"summary": "SUSE Bug 1256570 for CVE-2025-55131",
"url": "https://bugzilla.suse.com/1256570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-55131"
},
{
"cve": "CVE-2025-55132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55132"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js\u0027s permission model allows a file\u0027s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55132",
"url": "https://www.suse.com/security/cve/CVE-2025-55132"
},
{
"category": "external",
"summary": "SUSE Bug 1256571 for CVE-2025-55132",
"url": "https://bugzilla.suse.com/1256571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-17T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-55132"
},
{
"cve": "CVE-2025-59465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59465"
}
],
"notes": [
{
"category": "general",
"text": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59465",
"url": "https://www.suse.com/security/cve/CVE-2025-59465"
},
{
"category": "external",
"summary": "SUSE Bug 1256573 for CVE-2025-59465",
"url": "https://bugzilla.suse.com/1256573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-59465"
},
{
"cve": "CVE-2025-59466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59466"
}
],
"notes": [
{
"category": "general",
"text": "We have identified a bug in Node.js error handling where \"Maximum call stack size exceeded\" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(\u0027uncaughtException\u0027)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59466",
"url": "https://www.suse.com/security/cve/CVE-2025-59466"
},
{
"category": "external",
"summary": "SUSE Bug 1256574 for CVE-2025-59466",
"url": "https://bugzilla.suse.com/1256574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59466"
},
{
"cve": "CVE-2026-21637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-21637"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-21637",
"url": "https://www.suse.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "SUSE Bug 1256576 for CVE-2026-21637",
"url": "https://bugzilla.suse.com/1256576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:corepack24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-devel-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:nodejs24-docs-24.13.0-1.1.x86_64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.aarch64",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.ppc64le",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.s390x",
"openSUSE Tumbleweed:npm24-24.13.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-21637"
}
]
}
CERTFR-2026-AVI-0039
Vulnerability from certfr_avis - Published: 2026-01-14 - Updated: 2026-01-14
De multiples vulnérabilités ont été découvertes dans Node.js. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Node.js versions 24.x ant\u00e9rieures \u00e0 24.13.0",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions 25.x ant\u00e9rieures \u00e0 25.3.0",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions 22.x ant\u00e9rieures \u00e0 22.22.0",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions 20.x ant\u00e9rieures \u00e0 20.20.0",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
}
],
"initial_release_date": "2026-01-14T00:00:00",
"last_revision_date": "2026-01-14T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0039",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Node.js. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Node.js",
"vendor_advisories": [
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Node.js december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.