RHSA-2026:1843
Vulnerability from csaf_redhat - Published: 2026-02-05 16:03 - Updated: 2026-02-05 16:04Summary
Red Hat Security Advisory: nodejs22 security update
Notes
Topic
An update for nodejs22 is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.
Security Fix(es):
* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
* nodejs: Nodejs denial of service (CVE-2026-21637)
* nodejs: Nodejs denial of service (CVE-2025-59466)
* nodejs: Nodejs denial of service (CVE-2025-59465)
* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
* nodejs: Nodejs file permissions bypass (CVE-2025-55130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nodejs22 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a platform built on Chrome\u0027s JavaScript runtime \\ for easily building fast, scalable network applications. \\ Node.js uses an event-driven, non-blocking I/O model that \\ makes it lightweight and efficient, perfect for data-intensive \\ real-time applications that run across distributed devices.\n\nSecurity Fix(es):\n\n* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)\n\n* nodejs: Nodejs denial of service (CVE-2026-21637)\n\n* nodejs: Nodejs denial of service (CVE-2025-59466)\n\n* nodejs: Nodejs denial of service (CVE-2025-59465)\n\n* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)\n\n* nodejs: Nodejs file permissions bypass (CVE-2025-55130)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1843",
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2431338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431338"
},
{
"category": "external",
"summary": "2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "2431343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431343"
},
{
"category": "external",
"summary": "2431349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431349"
},
{
"category": "external",
"summary": "2431350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431350"
},
{
"category": "external",
"summary": "2431352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431352"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1843.json"
}
],
"title": "Red Hat Security Advisory: nodejs22 security update",
"tracking": {
"current_release_date": "2026-02-05T16:04:03+00:00",
"generator": {
"date": "2026-02-05T16:04:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1843",
"initial_release_date": "2026-02-05T16:03:36+00:00",
"revision_history": [
{
"date": "2026-02-05T16:03:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T16:03:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-05T16:04:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"product": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"product_id": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.4-1.22.22.0.3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_id": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.0-3.el10_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"product": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"product_id": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.4-1.22.22.0.3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_id": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.0-3.el10_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-devel-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-libs-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"product": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"product_id": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.4-1.22.22.0.3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"product": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_id": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.0-3.el10_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"product": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"product_id": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.4-1.22.22.0.3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_id": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.0-3.el10_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:22.22.0-3.el10_1.noarch",
"product": {
"name": "nodejs-docs-1:22.22.0-3.el10_1.noarch",
"product_id": "nodejs-docs-1:22.22.0-3.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@22.22.0-3.el10_1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs22-1:22.22.0-3.el10_1.src",
"product": {
"name": "nodejs22-1:22.22.0-3.el10_1.src",
"product_id": "nodejs22-1:22.22.0-3.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22@22.22.0-3.el10_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-devel-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:22.22.0-3.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch"
},
"product_reference": "nodejs-docs-1:22.22.0-3.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-libs-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64"
},
"product_reference": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le"
},
"product_reference": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x"
},
"product_reference": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64"
},
"product_reference": "nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-1:22.22.0-3.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src"
},
"product_reference": "nodejs22-1:22.22.0-3.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64"
},
"product_reference": "nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le"
},
"product_reference": "nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x"
},
"product_reference": "nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
},
"product_reference": "nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55130",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2026-01-20T21:03:01.083023+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431352"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u2019s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.\nThis vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs file permissions bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55130"
},
{
"category": "external",
"summary": "RHBZ#2431352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431352"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55130",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55130"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.393000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs file permissions bypass"
},
{
"cve": "CVE-2025-55131",
"cwe": {
"id": "CWE-497",
"name": "Exposure of Sensitive System Information to an Unauthorized Control Sphere"
},
"discovery_date": "2026-01-20T21:02:45.759578+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431350"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u0027s buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs uninitialized memory exposure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55131"
},
{
"category": "external",
"summary": "RHBZ#2431350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55131"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.591000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs uninitialized memory exposure"
},
{
"cve": "CVE-2025-55132",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"discovery_date": "2026-01-20T21:01:12.192484+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js\u0027s permission model allows a file\u0027s access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs filesystem permissions bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55132"
},
{
"category": "external",
"summary": "RHBZ#2431338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55132",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55132"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.620000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: Nodejs filesystem permissions bypass"
},
{
"cve": "CVE-2025-59465",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:02:37.799525+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431349"
}
],
"notes": [
{
"category": "description",
"text": "A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on(\u0027secureConnection\u0027, socket =\u003e {\n socket.on(\u0027error\u0027, err =\u003e {\n console.log(err)\n })\n})\n```",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59465"
},
{
"category": "external",
"summary": "RHBZ#2431349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59465"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.317000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2025-59466",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-20T21:01:46.025710+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431343"
}
],
"notes": [
{
"category": "description",
"text": "We have identified a bug in Node.js error handling where \"Maximum call stack size exceeded\" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on(\u0027uncaughtException\u0027)`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59466"
},
{
"category": "external",
"summary": "RHBZ#2431343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431343"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59466"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.628000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2026-21637",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:01:26.738343+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "RHBZ#2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.352000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T16:03:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1843"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.0-3.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.4-1.22.22.0.3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.0-3.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.0-3.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…