Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-1525 (GCVE-0-2026-1525)
Vulnerability from cvelistv5 – Published: 2026-03-12 19:56 – Updated: 2026-03-12 20:46- CWE-444 - Inconsistent interpretation of HTTP requests ('HTTP Request/Response smuggling')
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1525",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-12T20:44:24.555703Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-12T20:46:13.379Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://github.com/nodejs/undici/",
"defaultStatus": "unaffected",
"packageName": "undici",
"product": "undici",
"repo": "https://github.com/nodejs/undici/",
"vendor": "undici",
"versions": [
{
"status": "affected",
"version": "\u003c 6.24.0; 7.0.0 \u003c 7.24.0"
},
{
"status": "unaffected",
"version": "6.24.0: 7.24.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "remediation developer",
"value": "Matteo Collina"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Ulises Gasc\u00f3n"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eUndici allows duplicate HTTP\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;headers when they are provided in an array with case-variant names (e.g.,\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;and\u0026nbsp;\u003ccode\u003econtent-length\u003c/code\u003e). This produces malformed HTTP/1.1 requests with multiple conflicting\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;values on the wire.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWho is impacted:\u003c/strong\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eApplications using\u0026nbsp;\u003ccode\u003eundici.request()\u003c/code\u003e,\u0026nbsp;\u003ccode\u003eundici.Client\u003c/code\u003e, or similar low-level APIs with headers passed as flat arrays\u003c/li\u003e\u003cli\u003eApplications that accept user-controlled header names without case-normalization\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cstrong\u003ePotential consequences:\u003c/strong\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eDenial of Service\u003c/strong\u003e: Strict HTTP parsers (proxies, servers) will reject requests with duplicate\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;headers (400 Bad Request)\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eHTTP Request Smuggling\u003c/strong\u003e: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking\u003c/li\u003e\u003c/ul\u003e"
}
],
"value": "Undici allows duplicate HTTP\u00a0Content-Length\u00a0headers when they are provided in an array with case-variant names (e.g.,\u00a0Content-Length\u00a0and\u00a0content-length). This produces malformed HTTP/1.1 requests with multiple conflicting\u00a0Content-Length\u00a0values on the wire.\n\nWho is impacted:\n\n * Applications using\u00a0undici.request(),\u00a0undici.Client, or similar low-level APIs with headers passed as flat arrays\n * Applications that accept user-controlled header names without case-normalization\n\n\nPotential consequences:\n\n * Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate\u00a0Content-Length\u00a0headers (400 Bad Request)\n * HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking"
}
],
"impacts": [
{
"capecId": "CAPEC-33",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-33 HTTP Request Smuggling"
}
]
},
{
"capecId": "CAPEC-273",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-273 HTTP Response Smuggling"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent interpretation of HTTP requests (\u0027HTTP Request/Response smuggling\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-12T19:56:55.092Z",
"orgId": "ce714d77-add3-4f53-aff5-83d477b104bb",
"shortName": "openjs"
},
"references": [
{
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
},
{
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"url": "https://hackerone.com/reports/3556037"
},
{
"url": "https://cna.openjsf.org/security-advisories.html"
}
],
"source": {
"advisory": "GHSA-2mjp-6q6p-2qxm",
"discovery": "INTERNAL"
},
"title": "undici is vulnerable to Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIf upgrading is not immediately possible:\u003c/p\u003e\u003col\u003e\u003cli\u003e\u003cstrong\u003eValidate header names\u003c/strong\u003e: Ensure no duplicate\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;headers (case-insensitive) are present before passing headers to undici\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUse object format\u003c/strong\u003e: Pass headers as a plain object (\u003ccode\u003e{ \u0027content-length\u0027: \u0027123\u0027 }\u003c/code\u003e) rather than an array, which naturally deduplicates by key\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eSanitize user input\u003c/strong\u003e: If headers originate from user input, normalize header names to lowercase and reject duplicates\u003c/li\u003e\u003c/ol\u003e"
}
],
"value": "If upgrading is not immediately possible:\n\n * Validate header names: Ensure no duplicate\u00a0Content-Length\u00a0headers (case-insensitive) are present before passing headers to undici\n * Use object format: Pass headers as a plain object ({ \u0027content-length\u0027: \u0027123\u0027 }) rather than an array, which naturally deduplicates by key\n * Sanitize user input: If headers originate from user input, normalize header names to lowercase and reject duplicates"
}
],
"x_generator": {
"engine": "Vulnogram 1.0.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "ce714d77-add3-4f53-aff5-83d477b104bb",
"assignerShortName": "openjs",
"cveId": "CVE-2026-1525",
"datePublished": "2026-03-12T19:56:55.092Z",
"dateReserved": "2026-01-28T12:04:51.369Z",
"dateUpdated": "2026-03-12T20:46:13.379Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-1525",
"date": "2026-05-02",
"epss": "0.00018",
"percentile": "0.0468"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-1525\",\"sourceIdentifier\":\"ce714d77-add3-4f53-aff5-83d477b104bb\",\"published\":\"2026-03-12T20:16:02.670\",\"lastModified\":\"2026-03-19T17:29:34.053\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Undici allows duplicate HTTP\u00a0Content-Length\u00a0headers when they are provided in an array with case-variant names (e.g.,\u00a0Content-Length\u00a0and\u00a0content-length). This produces malformed HTTP/1.1 requests with multiple conflicting\u00a0Content-Length\u00a0values on the wire.\\n\\nWho is impacted:\\n\\n * Applications using\u00a0undici.request(),\u00a0undici.Client, or similar low-level APIs with headers passed as flat arrays\\n * Applications that accept user-controlled header names without case-normalization\\n\\n\\nPotential consequences:\\n\\n * Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate\u00a0Content-Length\u00a0headers (400 Bad Request)\\n * HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking\"},{\"lang\":\"es\",\"value\":\"Undici permite encabezados HTTP Content-Length duplicados cuando se proporcionan en un array con nombres que var\u00edan en may\u00fasculas/min\u00fasculas (p. ej., Content-Length y content-length). Esto produce solicitudes HTTP/1.1 malformadas con m\u00faltiples valores Content-Length conflictivos en la red.\\n\\nQui\u00e9nes son los afectados:\\n\\n * Aplicaciones que utilizan undici.request(), undici.Cliente, o APIs de bajo nivel similares con encabezados pasados como arrays planos\\n * Aplicaciones que aceptan nombres de encabezado controlados por el usuario sin normalizaci\u00f3n de may\u00fasculas/min\u00fasculas\\n\\nPosibles consecuencias:\\n\\n * Denegaci\u00f3n de Servicio: Analizadores HTTP estrictos (proxies, servidores) rechazar\u00e1n las solicitudes con encabezados Content-Length duplicados (400 Solicitud Incorrecta)\\n * Contrabando de Solicitudes HTTP: En implementaciones donde un intermediario y un backend interpretan encabezados duplicados de manera inconsistente (p. ej., uno usa el primer valor, el otro usa el \u00faltimo), esto puede habilitar ataques de contrabando de solicitudes que conducen a la omisi\u00f3n de ACL, envenenamiento de cach\u00e9 o secuestro de credenciales\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ce714d77-add3-4f53-aff5-83d477b104bb\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"ce714d77-add3-4f53-aff5-83d477b104bb\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"6.24.0\",\"matchCriteriaId\":\"C08CE582-019D-4A06-910A-6010C2D6EF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.24.0\",\"matchCriteriaId\":\"F016E7D9-C45A-4DEF-9AD8-F0581AF5E509\"}]}]}],\"references\":[{\"url\":\"https://cna.openjsf.org/security-advisories.html\",\"source\":\"ce714d77-add3-4f53-aff5-83d477b104bb\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cwe.mitre.org/data/definitions/444.html\",\"source\":\"ce714d77-add3-4f53-aff5-83d477b104bb\",\"tags\":[\"Technical Description\"]},{\"url\":\"https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm\",\"source\":\"ce714d77-add3-4f53-aff5-83d477b104bb\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://hackerone.com/reports/3556037\",\"source\":\"ce714d77-add3-4f53-aff5-83d477b104bb\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6\",\"source\":\"ce714d77-add3-4f53-aff5-83d477b104bb\",\"tags\":[\"Technical Description\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-1525\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-12T20:44:24.555703Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-12T20:44:25.316Z\"}}], \"cna\": {\"title\": \"undici is vulnerable to Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)\", \"source\": {\"advisory\": \"GHSA-2mjp-6q6p-2qxm\", \"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Matteo Collina\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Ulises Gasc\\u00f3n\"}], \"impacts\": [{\"capecId\": \"CAPEC-33\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-33 HTTP Request Smuggling\"}]}, {\"capecId\": \"CAPEC-273\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-273 HTTP Response Smuggling\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/nodejs/undici/\", \"vendor\": \"undici\", \"product\": \"undici\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 6.24.0; 7.0.0 \u003c 7.24.0\"}, {\"status\": \"unaffected\", \"version\": \"6.24.0: 7.24.0\"}], \"packageName\": \"undici\", \"collectionURL\": \"https://github.com/nodejs/undici/\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm\"}, {\"url\": \"https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6\"}, {\"url\": \"https://cwe.mitre.org/data/definitions/444.html\"}, {\"url\": \"https://hackerone.com/reports/3556037\"}, {\"url\": \"https://cna.openjsf.org/security-advisories.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"If upgrading is not immediately possible:\\n\\n * Validate header names: Ensure no duplicate\\u00a0Content-Length\\u00a0headers (case-insensitive) are present before passing headers to undici\\n * Use object format: Pass headers as a plain object ({ \u0027content-length\u0027: \u0027123\u0027 }) rather than an array, which naturally deduplicates by key\\n * Sanitize user input: If headers originate from user input, normalize header names to lowercase and reject duplicates\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIf upgrading is not immediately possible:\u003c/p\u003e\u003col\u003e\u003cli\u003e\u003cstrong\u003eValidate header names\u003c/strong\u003e: Ensure no duplicate\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;headers (case-insensitive) are present before passing headers to undici\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUse object format\u003c/strong\u003e: Pass headers as a plain object (\u003ccode\u003e{ \u0027content-length\u0027: \u0027123\u0027 }\u003c/code\u003e) rather than an array, which naturally deduplicates by key\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eSanitize user input\u003c/strong\u003e: If headers originate from user input, normalize header names to lowercase and reject duplicates\u003c/li\u003e\u003c/ol\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Undici allows duplicate HTTP\\u00a0Content-Length\\u00a0headers when they are provided in an array with case-variant names (e.g.,\\u00a0Content-Length\\u00a0and\\u00a0content-length). This produces malformed HTTP/1.1 requests with multiple conflicting\\u00a0Content-Length\\u00a0values on the wire.\\n\\nWho is impacted:\\n\\n * Applications using\\u00a0undici.request(),\\u00a0undici.Client, or similar low-level APIs with headers passed as flat arrays\\n * Applications that accept user-controlled header names without case-normalization\\n\\n\\nPotential consequences:\\n\\n * Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate\\u00a0Content-Length\\u00a0headers (400 Bad Request)\\n * HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eUndici allows duplicate HTTP\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;headers when they are provided in an array with case-variant names (e.g.,\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;and\u0026nbsp;\u003ccode\u003econtent-length\u003c/code\u003e). This produces malformed HTTP/1.1 requests with multiple conflicting\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;values on the wire.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWho is impacted:\u003c/strong\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eApplications using\u0026nbsp;\u003ccode\u003eundici.request()\u003c/code\u003e,\u0026nbsp;\u003ccode\u003eundici.Client\u003c/code\u003e, or similar low-level APIs with headers passed as flat arrays\u003c/li\u003e\u003cli\u003eApplications that accept user-controlled header names without case-normalization\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003cstrong\u003ePotential consequences:\u003c/strong\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eDenial of Service\u003c/strong\u003e: Strict HTTP parsers (proxies, servers) will reject requests with duplicate\u0026nbsp;\u003ccode\u003eContent-Length\u003c/code\u003e\u0026nbsp;headers (400 Bad Request)\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eHTTP Request Smuggling\u003c/strong\u003e: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking\u003c/li\u003e\u003c/ul\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-444\", \"description\": \"CWE-444 Inconsistent interpretation of HTTP requests (\u0027HTTP Request/Response smuggling\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"ce714d77-add3-4f53-aff5-83d477b104bb\", \"shortName\": \"openjs\", \"dateUpdated\": \"2026-03-12T19:56:55.092Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-1525\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-12T20:46:13.379Z\", \"dateReserved\": \"2026-01-28T12:04:51.369Z\", \"assignerOrgId\": \"ce714d77-add3-4f53-aff5-83d477b104bb\", \"datePublished\": \"2026-03-12T19:56:55.092Z\", \"assignerShortName\": \"openjs\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
alsa-2026:7350
Vulnerability from osv_almalinux
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
- nodejs: Nodejs denial of service (CVE-2026-21637)
- brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)
- minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
- undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)
- undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)
- undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
- undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
- undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
- undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
- nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
- Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)
- Node.js: Node.js: Denial of Service due to crafted HTTP
__proto__header (CVE-2026-21710) - Node.js: Node.js: Information disclosure due to
fs.realpathSync.native()bypassing filesystem read restrictions (CVE-2026-21715) - nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)
- Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)
- Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)
- Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)
- nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el9.7.0+222+ef1c61e1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el9.7.0+222+ef1c61e1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el9.7.0+222+ef1c61e1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-full-i18n"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el9.7.0+222+ef1c61e1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el9.7.0+222+ef1c61e1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-nodemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.3-3.module_el9.7.0+209+ecf6523e"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-packaging"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-6.module_el9.7.0+209+ecf6523e"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nodejs-packaging-bundler"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-6.module_el9.7.0+198+8bf605ba"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "npm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:11.11.0-1.24.14.1.2.module_el9.7.0+222+ef1c61e1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "v8-13.6-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3:13.6.233.17-1.24.14.1.2.module_el9.7.0+222+ef1c61e1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es): \n\n * nodejs: Nodejs denial of service (CVE-2026-21637)\n * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n * undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)\n * undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)\n * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n * Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)\n * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n * Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions (CVE-2026-21715)\n * nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)\n * Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)\n * Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)\n * Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)\n * nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:7350",
"modified": "2026-04-15T08:09:29Z",
"published": "2026-04-09T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1527"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21711"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21712"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21713"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21714"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21715"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21716"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21717"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-2581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2431340"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2436942"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2441268"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447140"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447141"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447142"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447143"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447144"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447145"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2448754"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453037"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453151"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453152"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453157"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453158"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453160"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453161"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453162"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2026-7350.html"
}
],
"related": [
"CVE-2026-21637",
"CVE-2026-25547",
"CVE-2026-26996",
"CVE-2026-2581",
"CVE-2026-1527",
"CVE-2026-1526",
"CVE-2026-2229",
"CVE-2026-1525",
"CVE-2026-1528",
"CVE-2026-27135",
"CVE-2026-21712",
"CVE-2026-21710",
"CVE-2026-21715",
"CVE-2026-21716",
"CVE-2026-21711",
"CVE-2026-21713",
"CVE-2026-21714",
"CVE-2026-21717"
],
"summary": "Important: nodejs:24 security update"
}
alsa-2026:7080
Vulnerability from osv_almalinux
Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.
Security Fix(es):
- brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)
- minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
- minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)
- undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
- undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
- undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
- undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
- nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
- Node.js: Node.js: Denial of Service due to crafted HTTP
__proto__header (CVE-2026-21710)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs-full-i18n"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs-npm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:10.9.7-1.22.22.2.1.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Node.js is a platform built on Chrome\u0027s JavaScript runtime \\ for easily building fast, scalable network applications. \\ Node.js uses an event-driven, non-blocking I/O model that \\ makes it lightweight and efficient, perfect for data-intensive \\ real-time applications that run across distributed devices. \n\nSecurity Fix(es): \n\n * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n * minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)\n * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:7080",
"modified": "2026-04-09T02:15:49Z",
"published": "2026-04-08T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2436942"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2441268"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2442922"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447142"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447143"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447144"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447145"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2448754"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453151"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2026-7080.html"
}
],
"related": [
"CVE-2026-25547",
"CVE-2026-26996",
"CVE-2026-27904",
"CVE-2026-1526",
"CVE-2026-2229",
"CVE-2026-1525",
"CVE-2026-1528",
"CVE-2026-27135",
"CVE-2026-21710"
],
"summary": "Important: nodejs22 security update"
}
alsa-2026:7670
Vulnerability from osv_almalinux
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
- nodejs: Nodejs denial of service (CVE-2026-21637)
- minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
- undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)
- undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)
- undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
- undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
- undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
- undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
- nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
- Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)
- Node.js: Node.js: Denial of Service due to crafted HTTP
__proto__header (CVE-2026-21710) - Node.js: Node.js: Information disclosure due to
fs.realpathSync.native()bypassing filesystem read restrictions (CVE-2026-21715) - nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)
- Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)
- Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)
- Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)
- nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el8.10.0+4160+4819ac42"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el8.10.0+4160+4819ac42"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el8.10.0+4160+4819ac42"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-full-i18n"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el8.10.0+4160+4819ac42"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.module_el8.10.0+4160+4819ac42"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-nodemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.3-1.module_el8.10.0+4061+f8ceeab9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-6.module_el8.10.0+4086+70facd4a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging-bundler"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-6.module_el8.10.0+4086+70facd4a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "npm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:11.11.0-1.24.14.1.2.module_el8.10.0+4160+4819ac42"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "v8-13.6-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3:13.6.233.17-1.24.14.1.2.module_el8.10.0+4160+4819ac42"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es): \n\n * nodejs: Nodejs denial of service (CVE-2026-21637)\n * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n * undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)\n * undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)\n * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n * Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)\n * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n * Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions (CVE-2026-21715)\n * nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)\n * Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)\n * Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)\n * Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)\n * nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:7670",
"modified": "2026-04-15T07:50:26Z",
"published": "2026-04-13T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1527"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21711"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21712"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21713"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21714"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21715"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21716"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21717"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-2581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2431340"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2441268"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447140"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447141"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447142"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447143"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447144"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447145"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2448754"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453037"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453151"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453152"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453157"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453158"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453160"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453161"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453162"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2026-7670.html"
}
],
"related": [
"CVE-2026-21637",
"CVE-2026-26996",
"CVE-2026-2581",
"CVE-2026-1527",
"CVE-2026-1526",
"CVE-2026-2229",
"CVE-2026-1525",
"CVE-2026-1528",
"CVE-2026-27135",
"CVE-2026-21712",
"CVE-2026-21710",
"CVE-2026-21715",
"CVE-2026-21716",
"CVE-2026-21711",
"CVE-2026-21713",
"CVE-2026-21714",
"CVE-2026-21717"
],
"summary": "Important: nodejs:24 security update"
}
alsa-2026:7675
Vulnerability from osv_almalinux
Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.
Security Fix(es):
- nodejs: Nodejs denial of service (CVE-2026-21637)
- brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)
- minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
- undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)
- undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)
- undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
- undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
- undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
- undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
- nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
- Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)
- Node.js: Node.js: Denial of Service due to crafted HTTP
__proto__header (CVE-2026-21710) - Node.js: Node.js: Information disclosure due to
fs.realpathSync.native()bypassing filesystem read restrictions (CVE-2026-21715) - nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)
- Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)
- Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)
- Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)
- nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs24"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs24-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs24-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs24-full-i18n"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs24-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:24.14.1-2.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nodejs24-npm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:11.11.0-1.24.14.1.2.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Node.js is a platform built on Chrome\u0027s JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices. \n\nSecurity Fix(es): \n\n * nodejs: Nodejs denial of service (CVE-2026-21637)\n * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n * undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)\n * undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)\n * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n * Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)\n * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n * Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions (CVE-2026-21715)\n * nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)\n * Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)\n * Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)\n * Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)\n * nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:7675",
"modified": "2026-04-14T13:07:01Z",
"published": "2026-04-13T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1527"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21711"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21712"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21713"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21714"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21715"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21716"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21717"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-2581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2431340"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2436942"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2441268"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447140"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447141"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447142"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447143"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447144"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447145"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2448754"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453037"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453151"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453152"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453157"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453158"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453160"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453161"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453162"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2026-7675.html"
}
],
"related": [
"CVE-2026-21637",
"CVE-2026-25547",
"CVE-2026-26996",
"CVE-2026-2581",
"CVE-2026-1527",
"CVE-2026-1526",
"CVE-2026-2229",
"CVE-2026-1525",
"CVE-2026-1528",
"CVE-2026-27135",
"CVE-2026-21712",
"CVE-2026-21710",
"CVE-2026-21715",
"CVE-2026-21716",
"CVE-2026-21711",
"CVE-2026-21713",
"CVE-2026-21714",
"CVE-2026-21717"
],
"summary": "Important: nodejs24 security update"
}
alsa-2026:7123
Vulnerability from osv_almalinux
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
- brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)
- minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
- minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)
- undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
- undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
- undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
- undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
- nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
- Node.js: Node.js: Denial of Service due to crafted HTTP
__proto__header (CVE-2026-21710)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-full-i18n"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:22.22.2-1.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-nodemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.1-1.module_el8.10.0+4006+3c416519"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-6.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging-bundler"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2021.06-6.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "npm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:10.9.7-1.22.22.2.1.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "v8-12.4-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3:12.4.254.21-1.22.22.2.1.module_el8.10.0+4158+e796f37f"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es): \n\n * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n * minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)\n * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:7123",
"modified": "2026-04-15T08:45:14Z",
"published": "2026-04-08T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2436942"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2441268"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2442922"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447142"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447143"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447144"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2447145"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2448754"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2453151"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2026-7123.html"
}
],
"related": [
"CVE-2026-25547",
"CVE-2026-26996",
"CVE-2026-27904",
"CVE-2026-1526",
"CVE-2026-2229",
"CVE-2026-1525",
"CVE-2026-1528",
"CVE-2026-27135",
"CVE-2026-21710"
],
"summary": "Important: nodejs:22 security update"
}
FKIE_CVE-2026-1525
Vulnerability from fkie_nvd - Published: 2026-03-12 20:16 - Updated: 2026-03-19 17:299.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| ce714d77-add3-4f53-aff5-83d477b104bb | https://cna.openjsf.org/security-advisories.html | Vendor Advisory | |
| ce714d77-add3-4f53-aff5-83d477b104bb | https://cwe.mitre.org/data/definitions/444.html | Technical Description | |
| ce714d77-add3-4f53-aff5-83d477b104bb | https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm | Mitigation, Vendor Advisory | |
| ce714d77-add3-4f53-aff5-83d477b104bb | https://hackerone.com/reports/3556037 | Permissions Required | |
| ce714d77-add3-4f53-aff5-83d477b104bb | https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6 | Technical Description |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "C08CE582-019D-4A06-910A-6010C2D6EF4F",
"versionEndExcluding": "6.24.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "F016E7D9-C45A-4DEF-9AD8-F0581AF5E509",
"versionEndExcluding": "7.24.0",
"versionStartIncluding": "7.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Undici allows duplicate HTTP\u00a0Content-Length\u00a0headers when they are provided in an array with case-variant names (e.g.,\u00a0Content-Length\u00a0and\u00a0content-length). This produces malformed HTTP/1.1 requests with multiple conflicting\u00a0Content-Length\u00a0values on the wire.\n\nWho is impacted:\n\n * Applications using\u00a0undici.request(),\u00a0undici.Client, or similar low-level APIs with headers passed as flat arrays\n * Applications that accept user-controlled header names without case-normalization\n\n\nPotential consequences:\n\n * Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate\u00a0Content-Length\u00a0headers (400 Bad Request)\n * HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking"
},
{
"lang": "es",
"value": "Undici permite encabezados HTTP Content-Length duplicados cuando se proporcionan en un array con nombres que var\u00edan en may\u00fasculas/min\u00fasculas (p. ej., Content-Length y content-length). Esto produce solicitudes HTTP/1.1 malformadas con m\u00faltiples valores Content-Length conflictivos en la red.\n\nQui\u00e9nes son los afectados:\n\n * Aplicaciones que utilizan undici.request(), undici.Cliente, o APIs de bajo nivel similares con encabezados pasados como arrays planos\n * Aplicaciones que aceptan nombres de encabezado controlados por el usuario sin normalizaci\u00f3n de may\u00fasculas/min\u00fasculas\n\nPosibles consecuencias:\n\n * Denegaci\u00f3n de Servicio: Analizadores HTTP estrictos (proxies, servidores) rechazar\u00e1n las solicitudes con encabezados Content-Length duplicados (400 Solicitud Incorrecta)\n * Contrabando de Solicitudes HTTP: En implementaciones donde un intermediario y un backend interpretan encabezados duplicados de manera inconsistente (p. ej., uno usa el primer valor, el otro usa el \u00faltimo), esto puede habilitar ataques de contrabando de solicitudes que conducen a la omisi\u00f3n de ACL, envenenamiento de cach\u00e9 o secuestro de credenciales"
}
],
"id": "CVE-2026-1525",
"lastModified": "2026-03-19T17:29:34.053",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "ce714d77-add3-4f53-aff5-83d477b104bb",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-03-12T20:16:02.670",
"references": [
{
"source": "ce714d77-add3-4f53-aff5-83d477b104bb",
"tags": [
"Vendor Advisory"
],
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"source": "ce714d77-add3-4f53-aff5-83d477b104bb",
"tags": [
"Technical Description"
],
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"source": "ce714d77-add3-4f53-aff5-83d477b104bb",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"source": "ce714d77-add3-4f53-aff5-83d477b104bb",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/3556037"
},
{
"source": "ce714d77-add3-4f53-aff5-83d477b104bb",
"tags": [
"Technical Description"
],
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"sourceIdentifier": "ce714d77-add3-4f53-aff5-83d477b104bb",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-444"
}
],
"source": "ce714d77-add3-4f53-aff5-83d477b104bb",
"type": "Secondary"
}
]
}
cleanstart-2026-dv49099
Vulnerability from cleanstart
Multiple security vulnerabilities affect the renovate package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "renovate"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "43.4.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the renovate package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DV49099",
"modified": "2026-03-23T10:49:42Z",
"published": "2026-04-01T09:31:16.419730Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DV49099.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-64756"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-69873"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1525"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1526"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1527"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1528"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-23745"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2391"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24842"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25128"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25547"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2581"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25896"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26278"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26960"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27601"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27903"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27904"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27942"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-28292"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-29786"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-31802"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33036"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-23c5-xmqv-rm74"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-25h7-pfq9-p65f"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2g4f-4pwh-qvx6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2mjp-6q6p-2qxm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-34x7-hfp2-rc4v"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37qj-frw5-hhjh"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-38c4-r59v-3vqw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3ppc-4f35-3m26"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4992-7rv2-5pvq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-5j98-mcp5-4vw2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-73rr-hh4g-fpgx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-7h2j-956f-4vf2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-7r86-cg39-jmmj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-83g3-92jg-28cx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-8gc5-j5rx-235r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-8qq5-rm4j-mr97"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-8wc6-vgrq-x6cf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9ppj-qmqm-q256"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f269-vfmq-vjvj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fj3w-jwp8-x2g3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jmr7-xgp7-cmfj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-m7jm-9gc2-mpf2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-phc3-fgpg-7m6h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qffp-2rhf-9h96"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qpx9-hpmf-5gmw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r275-fr43-pm7q"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6q2-hw4h-h46w"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v9p9-hfj2-hcw8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vrm6-8vpv-qv8q"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w7fw-mjwx-w883"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69873"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23745"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2391"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24842"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25128"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25896"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26278"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26960"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27601"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27903"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27942"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28292"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29786"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31802"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33036"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-64756, CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-23745, CVE-2026-2391, CVE-2026-24842, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-34x7-hfp2-rc4v, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-5j98-mcp5-4vw2, ghsa-73rr-hh4g-fpgx, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8qq5-rm4j-mr97, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-r6q2-hw4h-h46w, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.4-r0",
"upstream": [
"CVE-2025-64756",
"CVE-2025-69873",
"CVE-2026-1525",
"CVE-2026-1526",
"CVE-2026-1527",
"CVE-2026-1528",
"CVE-2026-2229",
"CVE-2026-2327",
"CVE-2026-23745",
"CVE-2026-2391",
"CVE-2026-24842",
"CVE-2026-25128",
"CVE-2026-25547",
"CVE-2026-2581",
"CVE-2026-25896",
"CVE-2026-26278",
"CVE-2026-26960",
"CVE-2026-27601",
"CVE-2026-27903",
"CVE-2026-27904",
"CVE-2026-27942",
"CVE-2026-28292",
"CVE-2026-29786",
"CVE-2026-31802",
"CVE-2026-32141",
"CVE-2026-33036",
"ghsa-23c5-xmqv-rm74",
"ghsa-25h7-pfq9-p65f",
"ghsa-2g4f-4pwh-qvx6",
"ghsa-2mjp-6q6p-2qxm",
"ghsa-34x7-hfp2-rc4v",
"ghsa-37qj-frw5-hhjh",
"ghsa-38c4-r59v-3vqw",
"ghsa-3ppc-4f35-3m26",
"ghsa-4992-7rv2-5pvq",
"ghsa-5j98-mcp5-4vw2",
"ghsa-73rr-hh4g-fpgx",
"ghsa-7h2j-956f-4vf2",
"ghsa-7r86-cg39-jmmj",
"ghsa-83g3-92jg-28cx",
"ghsa-8gc5-j5rx-235r",
"ghsa-8qq5-rm4j-mr97",
"ghsa-8wc6-vgrq-x6cf",
"ghsa-9ppj-qmqm-q256",
"ghsa-f269-vfmq-vjvj",
"ghsa-fj3w-jwp8-x2g3",
"ghsa-jmr7-xgp7-cmfj",
"ghsa-m7jm-9gc2-mpf2",
"ghsa-phc3-fgpg-7m6h",
"ghsa-qffp-2rhf-9h96",
"ghsa-qpx9-hpmf-5gmw",
"ghsa-r275-fr43-pm7q",
"ghsa-r6q2-hw4h-h46w",
"ghsa-v9p9-hfj2-hcw8",
"ghsa-vrm6-8vpv-qv8q",
"ghsa-w7fw-mjwx-w883"
]
}
cleanstart-2026-gs57401
Vulnerability from cleanstart
Multiple security vulnerabilities affect the renovate package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "renovate"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "43.4.3-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the renovate package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GS57401",
"modified": "2026-03-19T07:48:38Z",
"published": "2026-04-01T09:43:24.793409Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GS57401.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-69873"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1525"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1526"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1527"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1528"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2391"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25128"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25547"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2581"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25896"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26278"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26960"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27601"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27903"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27904"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27942"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-28292"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-29786"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-31802"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33036"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-23c5-xmqv-rm74"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-25h7-pfq9-p65f"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2g4f-4pwh-qvx6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2mjp-6q6p-2qxm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37qj-frw5-hhjh"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-38c4-r59v-3vqw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3ppc-4f35-3m26"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4992-7rv2-5pvq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-7h2j-956f-4vf2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-7r86-cg39-jmmj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-83g3-92jg-28cx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-8gc5-j5rx-235r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-8wc6-vgrq-x6cf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9ppj-qmqm-q256"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f269-vfmq-vjvj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fj3w-jwp8-x2g3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jmr7-xgp7-cmfj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-m7jm-9gc2-mpf2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-phc3-fgpg-7m6h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qffp-2rhf-9h96"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qpx9-hpmf-5gmw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r275-fr43-pm7q"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v9p9-hfj2-hcw8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vrm6-8vpv-qv8q"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w7fw-mjwx-w883"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69873"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2391"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25128"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25896"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26278"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26960"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27601"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27903"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27942"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28292"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29786"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31802"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33036"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-2391, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.3-r1",
"upstream": [
"CVE-2025-69873",
"CVE-2026-1525",
"CVE-2026-1526",
"CVE-2026-1527",
"CVE-2026-1528",
"CVE-2026-2229",
"CVE-2026-2327",
"CVE-2026-2391",
"CVE-2026-25128",
"CVE-2026-25547",
"CVE-2026-2581",
"CVE-2026-25896",
"CVE-2026-26278",
"CVE-2026-26960",
"CVE-2026-27601",
"CVE-2026-27903",
"CVE-2026-27904",
"CVE-2026-27942",
"CVE-2026-28292",
"CVE-2026-29786",
"CVE-2026-31802",
"CVE-2026-32141",
"CVE-2026-33036",
"ghsa-23c5-xmqv-rm74",
"ghsa-25h7-pfq9-p65f",
"ghsa-2g4f-4pwh-qvx6",
"ghsa-2mjp-6q6p-2qxm",
"ghsa-37qj-frw5-hhjh",
"ghsa-38c4-r59v-3vqw",
"ghsa-3ppc-4f35-3m26",
"ghsa-4992-7rv2-5pvq",
"ghsa-7h2j-956f-4vf2",
"ghsa-7r86-cg39-jmmj",
"ghsa-83g3-92jg-28cx",
"ghsa-8gc5-j5rx-235r",
"ghsa-8wc6-vgrq-x6cf",
"ghsa-9ppj-qmqm-q256",
"ghsa-f269-vfmq-vjvj",
"ghsa-fj3w-jwp8-x2g3",
"ghsa-jmr7-xgp7-cmfj",
"ghsa-m7jm-9gc2-mpf2",
"ghsa-phc3-fgpg-7m6h",
"ghsa-qffp-2rhf-9h96",
"ghsa-qpx9-hpmf-5gmw",
"ghsa-r275-fr43-pm7q",
"ghsa-v9p9-hfj2-hcw8",
"ghsa-vrm6-8vpv-qv8q",
"ghsa-w7fw-mjwx-w883"
]
}
RHSA-2026:7675
Vulnerability from csaf_redhat - Published: 2026-04-13 02:27 - Updated: 2026-04-29 14:41A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.
A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.
A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.
A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.
A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.
A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.
CWE-425 - Direct Request ('Forced Browsing')A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.
CWE-279 - Incorrect Execution-Assigned PermissionsA flaw was found in V8's string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8's internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.
A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nodejs24 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a platform built on Chrome\u0027s JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.\n\nSecurity Fix(es):\n\n* nodejs: Nodejs denial of service (CVE-2026-21637)\n\n* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)\n\n* undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\n* Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions (CVE-2026-21715)\n\n* nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)\n\n* Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)\n\n* Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)\n\n* Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)\n\n* nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7675",
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "2447140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447140"
},
{
"category": "external",
"summary": "2447141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447141"
},
{
"category": "external",
"summary": "2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "2453037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453037"
},
{
"category": "external",
"summary": "2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "2453152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152"
},
{
"category": "external",
"summary": "2453157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157"
},
{
"category": "external",
"summary": "2453158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453158"
},
{
"category": "external",
"summary": "2453160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160"
},
{
"category": "external",
"summary": "2453161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161"
},
{
"category": "external",
"summary": "2453162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7675.json"
}
],
"title": "Red Hat Security Advisory: nodejs24 security update",
"tracking": {
"current_release_date": "2026-04-29T14:41:45+00:00",
"generator": {
"date": "2026-04-29T14:41:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7675",
"initial_release_date": "2026-04-13T02:27:36+00:00",
"revision_history": [
{
"date": "2026-04-13T02:27:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-13T02:27:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T14:41:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.14.1-2.el10_1.s390x",
"product": {
"name": "nodejs24-1:24.14.1-2.el10_1.s390x",
"product_id": "nodejs24-1:24.14.1-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.14.1-2.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"product": {
"name": "nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"product_id": "nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-devel@24.14.1-2.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"product": {
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"product_id": "nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-full-i18n@24.14.1-2.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"product": {
"name": "nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"product_id": "nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs@24.14.1-2.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"product": {
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"product_id": "nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debugsource@24.14.1-2.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"product": {
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"product_id": "nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debuginfo@24.14.1-2.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"product": {
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"product_id": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs-debuginfo@24.14.1-2.el10_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.14.1-2.el10_1.x86_64",
"product": {
"name": "nodejs24-1:24.14.1-2.el10_1.x86_64",
"product_id": "nodejs24-1:24.14.1-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.14.1-2.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"product": {
"name": "nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"product_id": "nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-devel@24.14.1-2.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"product": {
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"product_id": "nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-full-i18n@24.14.1-2.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"product": {
"name": "nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"product_id": "nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs@24.14.1-2.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"product": {
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"product_id": "nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debugsource@24.14.1-2.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"product": {
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"product_id": "nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debuginfo@24.14.1-2.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"product": {
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"product_id": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs-debuginfo@24.14.1-2.el10_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.14.1-2.el10_1.src",
"product": {
"name": "nodejs24-1:24.14.1-2.el10_1.src",
"product_id": "nodejs24-1:24.14.1-2.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.14.1-2.el10_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.14.1-2.el10_1.aarch64",
"product": {
"name": "nodejs24-1:24.14.1-2.el10_1.aarch64",
"product_id": "nodejs24-1:24.14.1-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.14.1-2.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"product": {
"name": "nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"product_id": "nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-devel@24.14.1-2.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"product": {
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"product_id": "nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-full-i18n@24.14.1-2.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"product": {
"name": "nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"product_id": "nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs@24.14.1-2.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"product": {
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"product_id": "nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debugsource@24.14.1-2.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"product": {
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"product_id": "nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debuginfo@24.14.1-2.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"product": {
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"product_id": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs-debuginfo@24.14.1-2.el10_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-1:24.14.1-2.el10_1.ppc64le",
"product": {
"name": "nodejs24-1:24.14.1-2.el10_1.ppc64le",
"product_id": "nodejs24-1:24.14.1-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24@24.14.1-2.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"product": {
"name": "nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"product_id": "nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-devel@24.14.1-2.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"product": {
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"product_id": "nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-full-i18n@24.14.1-2.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"product": {
"name": "nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"product_id": "nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs@24.14.1-2.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"product": {
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"product_id": "nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debugsource@24.14.1-2.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"product": {
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"product_id": "nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-debuginfo@24.14.1-2.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"product": {
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"product_id": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-libs-debuginfo@24.14.1-2.el10_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"product": {
"name": "nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"product_id": "nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-docs@24.14.1-2.el10_1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch",
"product": {
"name": "nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch",
"product_id": "nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs24-npm@11.11.0-1.24.14.1.2.el10_1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.14.1-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64"
},
"product_reference": "nodejs24-1:24.14.1-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.14.1-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le"
},
"product_reference": "nodejs24-1:24.14.1-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.14.1-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x"
},
"product_reference": "nodejs24-1:24.14.1-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.14.1-2.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src"
},
"product_reference": "nodejs24-1:24.14.1-2.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-1:24.14.1-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64"
},
"product_reference": "nodejs24-1:24.14.1-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64"
},
"product_reference": "nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le"
},
"product_reference": "nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x"
},
"product_reference": "nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64"
},
"product_reference": "nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64"
},
"product_reference": "nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le"
},
"product_reference": "nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x"
},
"product_reference": "nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64"
},
"product_reference": "nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-1:24.14.1-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64"
},
"product_reference": "nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-1:24.14.1-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le"
},
"product_reference": "nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-1:24.14.1-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x"
},
"product_reference": "nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-devel-1:24.14.1-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64"
},
"product_reference": "nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-docs-1:24.14.1-2.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch"
},
"product_reference": "nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64"
},
"product_reference": "nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le"
},
"product_reference": "nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x"
},
"product_reference": "nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64"
},
"product_reference": "nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-1:24.14.1-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64"
},
"product_reference": "nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-1:24.14.1-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le"
},
"product_reference": "nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-1:24.14.1-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x"
},
"product_reference": "nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-1:24.14.1-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64"
},
"product_reference": "nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64"
},
"product_reference": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le"
},
"product_reference": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x"
},
"product_reference": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64"
},
"product_reference": "nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
},
"product_reference": "nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1527",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"discovery_date": "2026-03-12T21:01:21.390673+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP header injection and request smuggling vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1527"
},
{
"category": "external",
"summary": "RHBZ#2447141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1527",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487198",
"url": "https://hackerone.com/reports/3487198"
}
],
"release_date": "2026-03-12T20:17:18.984000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP header injection and request smuggling vulnerability"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"cve": "CVE-2026-2581",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:10.589089+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447140"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service due to uncontrolled resource consumption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2581"
},
{
"category": "external",
"summary": "RHBZ#2447140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2581",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2581"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3513473",
"url": "https://hackerone.com/reports/3513473"
}
],
"release_date": "2026-03-12T20:13:19.571000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: Denial of Service due to uncontrolled resource consumption"
},
{
"cve": "CVE-2026-21637",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:01:26.738343+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Systems configured according to Red Hat guidelines should have their services set to restart in the event of a process crash. This Host system service management mitigates the availability impact to Red Hat customers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "RHBZ#2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.352000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2026-21710",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-03-30T20:01:21.196629+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453151"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"category": "external",
"summary": "RHBZ#2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.558000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header"
},
{
"cve": "CVE-2026-21711",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"discovery_date": "2026-03-30T20:01:55.465001+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453158"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21711"
},
{
"category": "external",
"summary": "RHBZ#2453158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21711"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21711",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21711"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.526000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks"
},
{
"cve": "CVE-2026-21712",
"cwe": {
"id": "CWE-168",
"name": "Improper Handling of Inconsistent Special Elements"
},
"discovery_date": "2026-03-30T16:02:27.812711+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453037"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21712"
},
{
"category": "external",
"summary": "RHBZ#2453037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453037"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21712"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21712",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21712"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3546390",
"url": "https://hackerone.com/reports/3546390"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T15:13:59.172000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing"
},
{
"cve": "CVE-2026-21713",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2026-03-30T20:02:02.430513+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Information disclosure via timing oracle in HMAC verification",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21713"
},
{
"category": "external",
"summary": "RHBZ#2453160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21713"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.356000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Information disclosure via timing oracle in HMAC verification"
},
{
"cve": "CVE-2026-21714",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2026-03-30T20:02:06.237456+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453161"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21714"
},
{
"category": "external",
"summary": "RHBZ#2453161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21714"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21714",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21714"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.317000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames"
},
{
"cve": "CVE-2026-21715",
"cwe": {
"id": "CWE-425",
"name": "Direct Request (\u0027Forced Browsing\u0027)"
},
"discovery_date": "2026-03-30T20:01:25.714444+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453152"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21715"
},
{
"category": "external",
"summary": "RHBZ#2453152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21715"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.507000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions"
},
{
"cve": "CVE-2026-21716",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2026-03-30T20:01:51.136802+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453157"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21716"
},
{
"category": "external",
"summary": "RHBZ#2453157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21716"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.538000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix."
},
{
"cve": "CVE-2026-21717",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"discovery_date": "2026-03-30T20:02:10.986695+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453162"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in V8\u0027s string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8\u0027s internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21717"
},
{
"category": "external",
"summary": "RHBZ#2453162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21717"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.415000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions"
},
{
"cve": "CVE-2026-25547",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-02-04T22:01:11.784120+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436942"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "RHBZ#2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"category": "external",
"summary": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"release_date": "2026-02-04T21:51:17.198000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27135",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-18T19:02:13.823002+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448754"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"category": "external",
"summary": "RHBZ#2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
"url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
}
],
"release_date": "2026-03-18T17:59:02.045000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T02:27:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7675"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.src",
"AppStream-10.1.Z:nodejs24-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-debugsource-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-devel-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-docs-1:24.14.1-2.el10_1.noarch",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-full-i18n-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.aarch64",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.s390x",
"AppStream-10.1.Z:nodejs24-libs-debuginfo-1:24.14.1-2.el10_1.x86_64",
"AppStream-10.1.Z:nodejs24-npm-1:11.11.0-1.24.14.1.2.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination"
}
]
}
RHSA-2026:7670
Vulnerability from csaf_redhat - Published: 2026-04-13 03:00 - Updated: 2026-04-29 14:41A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.
A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.
A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.
A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.
A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.
A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.
CWE-425 - Direct Request ('Forced Browsing')A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.
CWE-279 - Incorrect Execution-Assigned PermissionsA flaw was found in V8's string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8's internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:24 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: Nodejs denial of service (CVE-2026-21637)\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)\n\n* undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\n* Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions (CVE-2026-21715)\n\n* nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)\n\n* Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)\n\n* Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)\n\n* Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)\n\n* nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7670",
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "2447140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447140"
},
{
"category": "external",
"summary": "2447141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447141"
},
{
"category": "external",
"summary": "2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "2453037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453037"
},
{
"category": "external",
"summary": "2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "2453152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152"
},
{
"category": "external",
"summary": "2453157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157"
},
{
"category": "external",
"summary": "2453158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453158"
},
{
"category": "external",
"summary": "2453160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160"
},
{
"category": "external",
"summary": "2453161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161"
},
{
"category": "external",
"summary": "2453162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162"
},
{
"category": "external",
"summary": "RHEL-151374",
"url": "https://issues.redhat.com/browse/RHEL-151374"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7670.json"
}
],
"title": "Red Hat Security Advisory: nodejs:24 security update",
"tracking": {
"current_release_date": "2026-04-29T14:41:44+00:00",
"generator": {
"date": "2026-04-29T14:41:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7670",
"initial_release_date": "2026-04-13T03:00:22+00:00",
"revision_history": [
{
"date": "2026-04-13T03:00:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-13T03:00:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T14:41:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=src\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"product": {
"name": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src (nodejs:24)",
"product_id": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.3-1.module%2Bel8.10.0%2B24190%2B49a46c75?arch=src\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"product": {
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src (nodejs:24)",
"product_id": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-6.module%2Bel8.10.0%2B24190%2B49a46c75?arch=src\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product": {
"name": "nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch (nodejs:24)",
"product_id": "nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product": {
"name": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch (nodejs:24)",
"product_id": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.3-1.module%2Bel8.10.0%2B24190%2B49a46c75?arch=noarch\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product": {
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch (nodejs:24)",
"product_id": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-6.module%2Bel8.10.0%2B24190%2B49a46c75?arch=noarch\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product": {
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch (nodejs:24)",
"product_id": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-6.module%2Bel8.10.0%2B24190%2B49a46c75?arch=noarch\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product": {
"name": "npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch (nodejs:24)",
"product_id": "npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@11.11.0-1.24.14.1.2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24)",
"product_id": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24)",
"product_id": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product": {
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24)",
"product_id": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24)",
"product_id": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product": {
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24)",
"product_id": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24)",
"product_id": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24)",
"product_id": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-13.6-devel@13.6.233.17-1.24.14.1.2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=aarch64\u0026epoch=3\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24)",
"product_id": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24)",
"product_id": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product": {
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24)",
"product_id": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24)",
"product_id": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product": {
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24)",
"product_id": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24)",
"product_id": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24)",
"product_id": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-13.6-devel@13.6.233.17-1.24.14.1.2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=ppc64le\u0026epoch=3\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24)",
"product_id": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24)",
"product_id": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product": {
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24)",
"product_id": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24)",
"product_id": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product": {
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24)",
"product_id": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24)",
"product_id": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24)",
"product_id": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-13.6-devel@13.6.233.17-1.24.14.1.2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=s390x\u0026epoch=3\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24)",
"product_id": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24)",
"product_id": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product": {
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24)",
"product_id": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24)",
"product_id": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product": {
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24)",
"product_id": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24)",
"product_id": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@24.14.1-2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
},
{
"category": "product_version",
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24)",
"product_id": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-13.6-devel@13.6.233.17-1.24.14.1.2.module%2Bel8.10.0%2B24190%2B49a46c75?arch=x86_64\u0026epoch=3\u0026rpmmod=nodejs:24:8100020260408131901:6d880403"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24"
},
"product_reference": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24"
},
"product_reference": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24"
},
"product_reference": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
},
"product_reference": "nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24"
},
"product_reference": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24"
},
"product_reference": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24"
},
"product_reference": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
},
"product_reference": "nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24"
},
"product_reference": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24"
},
"product_reference": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24"
},
"product_reference": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
},
"product_reference": "nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24"
},
"product_reference": "nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24"
},
"product_reference": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24"
},
"product_reference": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24"
},
"product_reference": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
},
"product_reference": "nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24"
},
"product_reference": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24"
},
"product_reference": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24"
},
"product_reference": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
},
"product_reference": "nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24"
},
"product_reference": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24"
},
"product_reference": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24"
},
"product_reference": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
},
"product_reference": "nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24"
},
"product_reference": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24"
},
"product_reference": "nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24"
},
"product_reference": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24"
},
"product_reference": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24"
},
"product_reference": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24"
},
"product_reference": "npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24"
},
"product_reference": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24"
},
"product_reference": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24"
},
"product_reference": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
},
"product_reference": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1527",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"discovery_date": "2026-03-12T21:01:21.390673+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP header injection and request smuggling vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1527"
},
{
"category": "external",
"summary": "RHBZ#2447141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1527",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487198",
"url": "https://hackerone.com/reports/3487198"
}
],
"release_date": "2026-03-12T20:17:18.984000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP header injection and request smuggling vulnerability"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"cve": "CVE-2026-2581",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:10.589089+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447140"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service due to uncontrolled resource consumption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2581"
},
{
"category": "external",
"summary": "RHBZ#2447140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2581",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2581"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3513473",
"url": "https://hackerone.com/reports/3513473"
}
],
"release_date": "2026-03-12T20:13:19.571000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: Denial of Service due to uncontrolled resource consumption"
},
{
"cve": "CVE-2026-21637",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:01:26.738343+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Systems configured according to Red Hat guidelines should have their services set to restart in the event of a process crash. This Host system service management mitigates the availability impact to Red Hat customers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "RHBZ#2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.352000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2026-21710",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-03-30T20:01:21.196629+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453151"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"category": "external",
"summary": "RHBZ#2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.558000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header"
},
{
"cve": "CVE-2026-21711",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"discovery_date": "2026-03-30T20:01:55.465001+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453158"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21711"
},
{
"category": "external",
"summary": "RHBZ#2453158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21711"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21711",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21711"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.526000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks"
},
{
"cve": "CVE-2026-21712",
"cwe": {
"id": "CWE-168",
"name": "Improper Handling of Inconsistent Special Elements"
},
"discovery_date": "2026-03-30T16:02:27.812711+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453037"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21712"
},
{
"category": "external",
"summary": "RHBZ#2453037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453037"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21712"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21712",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21712"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3546390",
"url": "https://hackerone.com/reports/3546390"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T15:13:59.172000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing"
},
{
"cve": "CVE-2026-21713",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2026-03-30T20:02:02.430513+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Information disclosure via timing oracle in HMAC verification",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21713"
},
{
"category": "external",
"summary": "RHBZ#2453160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21713"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.356000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Information disclosure via timing oracle in HMAC verification"
},
{
"cve": "CVE-2026-21714",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2026-03-30T20:02:06.237456+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453161"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21714"
},
{
"category": "external",
"summary": "RHBZ#2453161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21714"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21714",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21714"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.317000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames"
},
{
"cve": "CVE-2026-21715",
"cwe": {
"id": "CWE-425",
"name": "Direct Request (\u0027Forced Browsing\u0027)"
},
"discovery_date": "2026-03-30T20:01:25.714444+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453152"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21715"
},
{
"category": "external",
"summary": "RHBZ#2453152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21715"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.507000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions"
},
{
"cve": "CVE-2026-21716",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2026-03-30T20:01:51.136802+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453157"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21716"
},
{
"category": "external",
"summary": "RHBZ#2453157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21716"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.538000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix."
},
{
"cve": "CVE-2026-21717",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"discovery_date": "2026-03-30T20:02:10.986695+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453162"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in V8\u0027s string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8\u0027s internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21717"
},
{
"category": "external",
"summary": "RHBZ#2453162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21717"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.415000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27135",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-18T19:02:13.823002+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448754"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"category": "external",
"summary": "RHBZ#2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
"url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
}
],
"release_date": "2026-03-18T17:59:02.045000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-13T03:00:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7670"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:24.14.1-2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.3-1.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24190+49a46c75.src::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75.noarch::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.aarch64::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.ppc64le::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.s390x::nodejs:24",
"AppStream-8.10.0.Z.MAIN.EUS:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination"
}
]
}
RHSA-2026:7983
Vulnerability from csaf_redhat - Published: 2026-04-14 07:23 - Updated: 2026-04-30 13:11A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.
A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).
A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:22 module is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7983",
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7983.json"
}
],
"title": "Red Hat Security Advisory: nodejs:22 security update",
"tracking": {
"current_release_date": "2026-04-30T13:11:23+00:00",
"generator": {
"date": "2026-04-30T13:11:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7983",
"initial_release_date": "2026-04-14T07:23:22+00:00",
"revision_history": [
{
"date": "2026-04-14T07:23:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-14T07:23:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T13:11:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=src\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src (nodejs:22)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.6.0%2B23473%2B45664c2d?arch=src\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"product": {
"name": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src (nodejs:22)",
"product_id": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.6.0%2B23473%2B45664c2d?arch=src\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"product": {
"name": "nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch (nodejs:22)",
"product_id": "nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch (nodejs:22)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.6.0%2B23473%2B45664c2d?arch=noarch\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"product": {
"name": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch (nodejs:22)",
"product_id": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-4.module%2Bel9.6.0%2B23473%2B45664c2d?arch=noarch\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"product": {
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch (nodejs:22)",
"product_id": "nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-4.module%2Bel9.6.0%2B23473%2B45664c2d?arch=noarch\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=aarch64\u0026epoch=3\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=ppc64le\u0026epoch=3\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=s390x\u0026epoch=3\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel9.6.0%2B24196%2B39669d4e?arch=x86_64\u0026epoch=3\u0026rpmmod=nodejs:22:9060020260409121057:rhel9"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22"
},
"product_reference": "nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22"
},
"product_reference": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22"
},
"product_reference": "nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22"
},
"product_reference": "nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"cve": "CVE-2026-21710",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-03-30T20:01:21.196629+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453151"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"category": "external",
"summary": "RHBZ#2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.558000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header"
},
{
"cve": "CVE-2026-25547",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-02-04T22:01:11.784120+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436942"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "RHBZ#2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"category": "external",
"summary": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"release_date": "2026-02-04T21:51:17.198000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27135",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-18T19:02:13.823002+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448754"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"category": "external",
"summary": "RHBZ#2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
"url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
}
],
"release_date": "2026-03-18T17:59:02.045000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination"
},
{
"cve": "CVE-2026-27904",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-26T02:01:23.004531+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442922"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "RHBZ#2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74"
}
],
"release_date": "2026-02-26T01:07:42.693000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-14T07:23:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-debugsource-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-devel-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-docs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-full-i18n-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-nodemon-0:3.0.1-1.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-0:2021.06-4.module+el9.6.0+23473+45664c2d.src::nodejs:22",
"AppStream-9.6.0.Z.EUS:nodejs-packaging-bundler-0:2021.06-4.module+el9.6.0+23473+45664c2d.noarch::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:npm-1:10.9.7-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.aarch64::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.ppc64le::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.s390x::nodejs:22",
"AppStream-9.6.0.Z.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.6.0+24196+39669d4e.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions"
}
]
}
RHSA-2026:7302
Vulnerability from csaf_redhat - Published: 2026-04-09 13:04 - Updated: 2026-04-30 13:11A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.
A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).
A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:22 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7302",
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7302.json"
}
],
"title": "Red Hat Security Advisory: nodejs:22 security update",
"tracking": {
"current_release_date": "2026-04-30T13:11:20+00:00",
"generator": {
"date": "2026-04-30T13:11:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7302",
"initial_release_date": "2026-04-09T13:04:58+00:00",
"revision_history": [
{
"date": "2026-04-09T13:04:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-09T13:04:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T13:11:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=src\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src (nodejs:22)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=src\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"product": {
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src (nodejs:22)",
"product_id": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-6.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=src\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"product": {
"name": "nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch (nodejs:22)",
"product_id": "nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch (nodejs:22)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=noarch\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"product": {
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch (nodejs:22)",
"product_id": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-6.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=noarch\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"product": {
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch (nodejs:22)",
"product_id": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-6.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=noarch\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=aarch64\u0026epoch=3\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=ppc64le\u0026epoch=3\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=s390x\u0026epoch=3\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel9.7.0%2B24157%2B8ddb2461?arch=x86_64\u0026epoch=3\u0026rpmmod=nodejs:22:9070020260401095228:rhel9"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22"
},
"product_reference": "nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22"
},
"product_reference": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22"
},
"product_reference": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22"
},
"product_reference": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"cve": "CVE-2026-21710",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-03-30T20:01:21.196629+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453151"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"category": "external",
"summary": "RHBZ#2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.558000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header"
},
{
"cve": "CVE-2026-25547",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-02-04T22:01:11.784120+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436942"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "RHBZ#2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"category": "external",
"summary": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"release_date": "2026-02-04T21:51:17.198000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27135",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-18T19:02:13.823002+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448754"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"category": "external",
"summary": "RHBZ#2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
"url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
}
],
"release_date": "2026-03-18T17:59:02.045000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination"
},
{
"cve": "CVE-2026-27904",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-26T02:01:23.004531+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442922"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "RHBZ#2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74"
}
],
"release_date": "2026-02-26T01:07:42.693000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:04:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7302"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:22.22.2-1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.1-1.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24157+8ddb2461.src::nodejs:22",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24157+8ddb2461.noarch::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:npm-1:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.aarch64::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.ppc64le::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.s390x::nodejs:22",
"AppStream-9.7.0.Z.MAIN:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions"
}
]
}
RHSA-2026:7310
Vulnerability from csaf_redhat - Published: 2026-04-09 13:38 - Updated: 2026-04-30 13:11A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.
A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).
A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nodejs22 is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a platform built on Chrome\u0027s JavaScript runtime \\ for easily building fast, scalable network applications. \\ Node.js uses an event-driven, non-blocking I/O model that \\ makes it lightweight and efficient, perfect for data-intensive \\ real-time applications that run across distributed devices.\n\nSecurity Fix(es):\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7310",
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7310.json"
}
],
"title": "Red Hat Security Advisory: nodejs22 security update",
"tracking": {
"current_release_date": "2026-04-30T13:11:21+00:00",
"generator": {
"date": "2026-04-30T13:11:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7310",
"initial_release_date": "2026-04-09T13:38:21+00:00",
"revision_history": [
{
"date": "2026-04-09T13:38:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-09T13:38:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T13:11:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-2.el10_0.x86_64",
"product": {
"name": "nodejs-1:22.22.2-2.el10_0.x86_64",
"product_id": "nodejs-1:22.22.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"product": {
"name": "nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"product_id": "nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"product_id": "nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"product": {
"name": "nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"product_id": "nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"product": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"product_id": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.7-1.22.22.2.2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64",
"product": {
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64",
"product_id": "nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.2-2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product_id": "nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product": {
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product_id": "nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.2-2.el10_0?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-2.el10_0.aarch64",
"product": {
"name": "nodejs-1:22.22.2-2.el10_0.aarch64",
"product_id": "nodejs-1:22.22.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"product": {
"name": "nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"product_id": "nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"product_id": "nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"product": {
"name": "nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"product_id": "nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"product": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"product_id": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.7-1.22.22.2.2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"product": {
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"product_id": "nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.2-2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product_id": "nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product": {
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product_id": "nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.2-2.el10_0?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-2.el10_0.ppc64le",
"product": {
"name": "nodejs-1:22.22.2-2.el10_0.ppc64le",
"product_id": "nodejs-1:22.22.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"product": {
"name": "nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"product_id": "nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"product_id": "nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"product": {
"name": "nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"product_id": "nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"product": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"product_id": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.7-1.22.22.2.2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"product": {
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"product_id": "nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.2-2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product_id": "nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product": {
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product_id": "nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.2-2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-2.el10_0.s390x",
"product": {
"name": "nodejs-1:22.22.2-2.el10_0.s390x",
"product_id": "nodejs-1:22.22.2-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-2.el10_0.s390x",
"product": {
"name": "nodejs-devel-1:22.22.2-2.el10_0.s390x",
"product_id": "nodejs-devel-1:22.22.2-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"product_id": "nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-2.el10_0.s390x",
"product": {
"name": "nodejs-libs-1:22.22.2-2.el10_0.s390x",
"product_id": "nodejs-libs-1:22.22.2-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"product": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"product_id": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.7-1.22.22.2.2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"product": {
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"product_id": "nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.2-2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"product_id": "nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"product": {
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"product_id": "nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.2-2.el10_0?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:22.22.2-2.el10_0.noarch",
"product": {
"name": "nodejs-docs-1:22.22.2-2.el10_0.noarch",
"product_id": "nodejs-docs-1:22.22.2-2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@22.22.2-2.el10_0?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs22-1:22.22.2-2.el10_0.src",
"product": {
"name": "nodejs22-1:22.22.2-2.el10_0.src",
"product_id": "nodejs22-1:22.22.2-2.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22@22.22.2-2.el10_0?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64"
},
"product_reference": "nodejs-1:22.22.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le"
},
"product_reference": "nodejs-1:22.22.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x"
},
"product_reference": "nodejs-1:22.22.2-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64"
},
"product_reference": "nodejs-1:22.22.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64"
},
"product_reference": "nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le"
},
"product_reference": "nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x"
},
"product_reference": "nodejs-devel-1:22.22.2-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64"
},
"product_reference": "nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:22.22.2-2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch"
},
"product_reference": "nodejs-docs-1:22.22.2-2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64"
},
"product_reference": "nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le"
},
"product_reference": "nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x"
},
"product_reference": "nodejs-libs-1:22.22.2-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64"
},
"product_reference": "nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64"
},
"product_reference": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le"
},
"product_reference": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x"
},
"product_reference": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64"
},
"product_reference": "nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-1:22.22.2-2.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src"
},
"product_reference": "nodejs22-1:22.22.2-2.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64"
},
"product_reference": "nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le"
},
"product_reference": "nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x"
},
"product_reference": "nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64"
},
"product_reference": "nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64"
},
"product_reference": "nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le"
},
"product_reference": "nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x"
},
"product_reference": "nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
},
"product_reference": "nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"cve": "CVE-2026-21710",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-03-30T20:01:21.196629+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453151"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"category": "external",
"summary": "RHBZ#2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.558000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header"
},
{
"cve": "CVE-2026-25547",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-02-04T22:01:11.784120+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436942"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "RHBZ#2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"category": "external",
"summary": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"release_date": "2026-02-04T21:51:17.198000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27135",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-18T19:02:13.823002+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448754"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"category": "external",
"summary": "RHBZ#2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
"url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
}
],
"release_date": "2026-03-18T17:59:02.045000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination"
},
{
"cve": "CVE-2026-27904",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-26T02:01:23.004531+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442922"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "RHBZ#2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74"
}
],
"release_date": "2026-02-26T01:07:42.693000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T13:38:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7310"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-devel-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-docs-1:22.22.2-2.el10_0.noarch",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-full-i18n-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-libs-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs-npm-1:10.9.7-1.22.22.2.2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-1:22.22.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debuginfo-1:22.22.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:nodejs22-debugsource-1:22.22.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions"
}
]
}
RHSA-2026:7080
Vulnerability from csaf_redhat - Published: 2026-04-08 13:58 - Updated: 2026-04-30 13:11A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.
A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).
A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nodejs22 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a platform built on Chrome\u0027s JavaScript runtime \\ for easily building fast, scalable network applications. \\ Node.js uses an event-driven, non-blocking I/O model that \\ makes it lightweight and efficient, perfect for data-intensive \\ real-time applications that run across distributed devices.\n\nSecurity Fix(es):\n\n* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7080",
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7080.json"
}
],
"title": "Red Hat Security Advisory: nodejs22 security update",
"tracking": {
"current_release_date": "2026-04-30T13:11:19+00:00",
"generator": {
"date": "2026-04-30T13:11:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7080",
"initial_release_date": "2026-04-08T13:58:58+00:00",
"revision_history": [
{
"date": "2026-04-08T13:58:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-08T13:58:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T13:11:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.el10_1.aarch64",
"product": {
"name": "nodejs-1:22.22.2-1.el10_1.aarch64",
"product_id": "nodejs-1:22.22.2-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"product": {
"name": "nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"product_id": "nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"product_id": "nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"product": {
"name": "nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"product_id": "nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"product": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"product_id": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.7-1.22.22.2.1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"product": {
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"product_id": "nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.2-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product_id": "nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product": {
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product_id": "nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.2-1.el10_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.el10_1.ppc64le",
"product": {
"name": "nodejs-1:22.22.2-1.el10_1.ppc64le",
"product_id": "nodejs-1:22.22.2-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"product": {
"name": "nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"product_id": "nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"product_id": "nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"product": {
"name": "nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"product_id": "nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"product": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"product_id": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.7-1.22.22.2.1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"product": {
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"product_id": "nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.2-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product_id": "nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product": {
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product_id": "nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.2-1.el10_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.el10_1.x86_64",
"product": {
"name": "nodejs-1:22.22.2-1.el10_1.x86_64",
"product_id": "nodejs-1:22.22.2-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"product": {
"name": "nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"product_id": "nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"product_id": "nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"product": {
"name": "nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"product_id": "nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"product": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"product_id": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.7-1.22.22.2.1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64",
"product": {
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64",
"product_id": "nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.2-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product_id": "nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product": {
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product_id": "nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.2-1.el10_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.el10_1.s390x",
"product": {
"name": "nodejs-1:22.22.2-1.el10_1.s390x",
"product_id": "nodejs-1:22.22.2-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.el10_1.s390x",
"product": {
"name": "nodejs-devel-1:22.22.2-1.el10_1.s390x",
"product_id": "nodejs-devel-1:22.22.2-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"product_id": "nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.el10_1.s390x",
"product": {
"name": "nodejs-libs-1:22.22.2-1.el10_1.s390x",
"product_id": "nodejs-libs-1:22.22.2-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"product": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"product_id": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-npm@10.9.7-1.22.22.2.1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"product": {
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"product_id": "nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debugsource@22.22.2-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"product_id": "nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.el10_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"product": {
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"product_id": "nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22-debuginfo@22.22.2-1.el10_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:22.22.2-1.el10_1.noarch",
"product": {
"name": "nodejs-docs-1:22.22.2-1.el10_1.noarch",
"product_id": "nodejs-docs-1:22.22.2-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@22.22.2-1.el10_1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs22-1:22.22.2-1.el10_1.src",
"product": {
"name": "nodejs22-1:22.22.2-1.el10_1.src",
"product_id": "nodejs22-1:22.22.2-1.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs22@22.22.2-1.el10_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64"
},
"product_reference": "nodejs-1:22.22.2-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le"
},
"product_reference": "nodejs-1:22.22.2-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x"
},
"product_reference": "nodejs-1:22.22.2-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64"
},
"product_reference": "nodejs-1:22.22.2-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64"
},
"product_reference": "nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le"
},
"product_reference": "nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x"
},
"product_reference": "nodejs-devel-1:22.22.2-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64"
},
"product_reference": "nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:22.22.2-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch"
},
"product_reference": "nodejs-docs-1:22.22.2-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64"
},
"product_reference": "nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le"
},
"product_reference": "nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x"
},
"product_reference": "nodejs-libs-1:22.22.2-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64"
},
"product_reference": "nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64"
},
"product_reference": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le"
},
"product_reference": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x"
},
"product_reference": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64"
},
"product_reference": "nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-1:22.22.2-1.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src"
},
"product_reference": "nodejs22-1:22.22.2-1.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64"
},
"product_reference": "nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le"
},
"product_reference": "nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x"
},
"product_reference": "nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64"
},
"product_reference": "nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64"
},
"product_reference": "nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le"
},
"product_reference": "nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x"
},
"product_reference": "nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
},
"product_reference": "nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"cve": "CVE-2026-21710",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-03-30T20:01:21.196629+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453151"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"category": "external",
"summary": "RHBZ#2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.558000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header"
},
{
"cve": "CVE-2026-25547",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-02-04T22:01:11.784120+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436942"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "RHBZ#2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"category": "external",
"summary": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"release_date": "2026-02-04T21:51:17.198000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27135",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-18T19:02:13.823002+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448754"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"category": "external",
"summary": "RHBZ#2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
"url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
}
],
"release_date": "2026-03-18T17:59:02.045000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination"
},
{
"cve": "CVE-2026-27904",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-26T02:01:23.004531+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442922"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "RHBZ#2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74"
}
],
"release_date": "2026-02-26T01:07:42.693000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:58:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7080"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-devel-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-docs-1:22.22.2-1.el10_1.noarch",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-full-i18n-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-libs-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.s390x",
"AppStream-10.1.Z:nodejs-npm-1:10.9.7-1.22.22.2.1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-1:22.22.2-1.el10_1.src",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debuginfo-1:22.22.2-1.el10_1.x86_64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.aarch64",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.ppc64le",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.s390x",
"AppStream-10.1.Z:nodejs22-debugsource-1:22.22.2-1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions"
}
]
}
RHSA-2026:7350
Vulnerability from csaf_redhat - Published: 2026-04-09 20:27 - Updated: 2026-04-29 14:41A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.
A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.
A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.
A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.
A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.
A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.
CWE-425 - Direct Request ('Forced Browsing')A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.
CWE-279 - Incorrect Execution-Assigned PermissionsA flaw was found in V8's string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8's internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.
A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:24 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: Nodejs denial of service (CVE-2026-21637)\n\n* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)\n\n* undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\n* Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions (CVE-2026-21715)\n\n* nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)\n\n* Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)\n\n* Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)\n\n* Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)\n\n* nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7350",
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "2447140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447140"
},
{
"category": "external",
"summary": "2447141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447141"
},
{
"category": "external",
"summary": "2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "2453037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453037"
},
{
"category": "external",
"summary": "2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "2453152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152"
},
{
"category": "external",
"summary": "2453157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157"
},
{
"category": "external",
"summary": "2453158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453158"
},
{
"category": "external",
"summary": "2453160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160"
},
{
"category": "external",
"summary": "2453161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161"
},
{
"category": "external",
"summary": "2453162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7350.json"
}
],
"title": "Red Hat Security Advisory: nodejs:24 security update",
"tracking": {
"current_release_date": "2026-04-29T14:41:42+00:00",
"generator": {
"date": "2026-04-29T14:41:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7350",
"initial_release_date": "2026-04-09T20:27:37+00:00",
"revision_history": [
{
"date": "2026-04-09T20:27:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-09T20:27:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T14:41:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=src\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"product": {
"name": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src (nodejs:24)",
"product_id": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.3-3.module%2Bel9.7.0%2B24166%2B51c9666b?arch=src\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"product": {
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src (nodejs:24)",
"product_id": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-6.module%2Bel9.7.0%2B24166%2B51c9666b?arch=src\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product": {
"name": "nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch (nodejs:24)",
"product_id": "nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product": {
"name": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch (nodejs:24)",
"product_id": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.3-3.module%2Bel9.7.0%2B24166%2B51c9666b?arch=noarch\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product": {
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch (nodejs:24)",
"product_id": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-6.module%2Bel9.7.0%2B24166%2B51c9666b?arch=noarch\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product": {
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch (nodejs:24)",
"product_id": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-6.module%2Bel9.7.0%2B24166%2B51c9666b?arch=noarch\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product": {
"name": "npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch (nodejs:24)",
"product_id": "npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@11.11.0-1.24.14.1.2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24)",
"product_id": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24)",
"product_id": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product": {
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24)",
"product_id": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24)",
"product_id": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product": {
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24)",
"product_id": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24)",
"product_id": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24)",
"product_id": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-13.6-devel@13.6.233.17-1.24.14.1.2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=aarch64\u0026epoch=3\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24)",
"product_id": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24)",
"product_id": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product": {
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24)",
"product_id": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24)",
"product_id": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product": {
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24)",
"product_id": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24)",
"product_id": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24)",
"product_id": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-13.6-devel@13.6.233.17-1.24.14.1.2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=ppc64le\u0026epoch=3\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24)",
"product_id": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24)",
"product_id": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product": {
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24)",
"product_id": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24)",
"product_id": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product": {
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24)",
"product_id": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24)",
"product_id": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24)",
"product_id": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-13.6-devel@13.6.233.17-1.24.14.1.2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=s390x\u0026epoch=3\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24)",
"product_id": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24)",
"product_id": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24)",
"product_id": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product": {
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24)",
"product_id": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24)",
"product_id": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product": {
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24)",
"product_id": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24)",
"product_id": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@24.14.1-2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
},
{
"category": "product_version",
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24)",
"product_id": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-13.6-devel@13.6.233.17-1.24.14.1.2.module%2Bel9.7.0%2B24166%2B51c9666b?arch=x86_64\u0026epoch=3\u0026rpmmod=nodejs:24:9070020260402152654:rhel9"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
},
"product_reference": "nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24"
},
"product_reference": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24"
},
"product_reference": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24"
},
"product_reference": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
},
"product_reference": "nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24"
},
"product_reference": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24"
},
"product_reference": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24"
},
"product_reference": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
},
"product_reference": "nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24"
},
"product_reference": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24"
},
"product_reference": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24"
},
"product_reference": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
},
"product_reference": "nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24"
},
"product_reference": "nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24"
},
"product_reference": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24"
},
"product_reference": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24"
},
"product_reference": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
},
"product_reference": "nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24"
},
"product_reference": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24"
},
"product_reference": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24"
},
"product_reference": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
},
"product_reference": "nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24"
},
"product_reference": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24"
},
"product_reference": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24"
},
"product_reference": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
},
"product_reference": "nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24"
},
"product_reference": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24"
},
"product_reference": "nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24"
},
"product_reference": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24"
},
"product_reference": "nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24"
},
"product_reference": "nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24"
},
"product_reference": "npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24"
},
"product_reference": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24"
},
"product_reference": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24"
},
"product_reference": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64 (nodejs:24) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
},
"product_reference": "v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1527",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"discovery_date": "2026-03-12T21:01:21.390673+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. This vulnerability allows a remote attacker to inject malicious data into HTTP headers or prematurely end HTTP requests by sending specially crafted input to the `upgrade` option of `client.request()`. This is possible because undici does not properly validate input for invalid header characters, which could lead to unauthorized information disclosure or bypassing of security controls.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP header injection and request smuggling vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1527"
},
{
"category": "external",
"summary": "RHBZ#2447141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1527",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1527"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487198",
"url": "https://hackerone.com/reports/3487198"
}
],
"release_date": "2026-03-12T20:17:18.984000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP header injection and request smuggling vulnerability"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"cve": "CVE-2026-2581",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:10.589089+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447140"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undici. When the `interceptors.deduplicate()` feature is enabled, response data for deduplicated requests can accumulate in memory. A remote attacker, by sending large or chunked responses and concurrent identical requests from an untrusted endpoint, can exploit this uncontrolled resource consumption. This leads to high memory usage and potential Out-Of-Memory (OOM) process termination, resulting in a Denial of Service (DoS) for the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service due to uncontrolled resource consumption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2581"
},
{
"category": "external",
"summary": "RHBZ#2447140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2581",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2581"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2581"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3513473",
"url": "https://hackerone.com/reports/3513473"
}
],
"release_date": "2026-03-12T20:13:19.571000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: Denial of Service due to uncontrolled resource consumption"
},
{
"cve": "CVE-2026-21637",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-01-20T21:01:26.738343+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Nodejs denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Systems configured according to Red Hat guidelines should have their services set to restart in the event of a process crash. This Host system service management mitigates the availability impact to Red Hat customers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21637"
},
{
"category": "external",
"summary": "RHBZ#2431340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21637"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases"
}
],
"release_date": "2026-01-20T20:41:55.352000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Nodejs denial of service"
},
{
"cve": "CVE-2026-21710",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-03-30T20:01:21.196629+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453151"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"category": "external",
"summary": "RHBZ#2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.558000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header"
},
{
"cve": "CVE-2026-21711",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"discovery_date": "2026-03-30T20:01:55.465001+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453158"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The Node.js Permission Model, designed to restrict network access, incorrectly omits permission checks for Unix Domain Socket (UDS) server operations. This allows local code, even when explicitly denied network access, to create and expose inter-process communication (IPC) endpoints. As a result, unauthorized communication can occur between processes on the same host, bypassing the intended network security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21711"
},
{
"category": "external",
"summary": "RHBZ#2453158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21711"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21711",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21711"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.526000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks"
},
{
"cve": "CVE-2026-21712",
"cwe": {
"id": "CWE-168",
"name": "Improper Handling of Inconsistent Special Elements"
},
"discovery_date": "2026-03-30T16:02:27.812711+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453037"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. This vulnerability allows an attacker to cause a Denial of Service (DoS) by providing a malformed Internationalized Domain Name (IDN) to the `url.format()` function. When processed, this malformed input triggers an internal error, causing the Node.js application to crash. This can disrupt services and make them unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21712"
},
{
"category": "external",
"summary": "RHBZ#2453037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453037"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21712"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21712",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21712"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3546390",
"url": "https://hackerone.com/reports/3546390"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T15:13:59.172000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing"
},
{
"cve": "CVE-2026-21713",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2026-03-30T20:02:02.430513+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453160"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The HMAC (Hash-based Message Authentication Code) verification process uses a comparison method that does not take a constant amount of time. This non-constant-time comparison can leak timing information, which, under specific conditions where precise timing measurements are possible, could be exploited by a remote attacker. This allows the attacker to infer sensitive HMAC values, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Information disclosure via timing oracle in HMAC verification",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21713"
},
{
"category": "external",
"summary": "RHBZ#2453160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21713"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21713",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21713"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.356000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Information disclosure via timing oracle in HMAC verification"
},
{
"cve": "CVE-2026-21714",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2026-03-30T20:02:06.237456+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453161"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability in Node.js HTTP/2 servers by sending specially crafted WINDOW_UPDATE frames on stream 0 (connection-level). These frames can cause the flow control window to exceed its maximum value, leading to a memory leak as Http2Session objects are not properly cleaned up. This can result in resource exhaustion and a Denial of Service (DoS) condition for the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21714"
},
{
"category": "external",
"summary": "RHBZ#2453161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21714"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21714",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21714"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.317000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames"
},
{
"cve": "CVE-2026-21715",
"cwe": {
"id": "CWE-425",
"name": "Direct Request (\u0027Forced Browsing\u0027)"
},
"discovery_date": "2026-03-30T20:01:25.714444+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453152"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. The Node.js Permission Model, intended to restrict filesystem access, does not properly enforce read permission checks for the `fs.realpathSync.native()` function. This vulnerability allows code operating under `--permission` with restricted `--allow-fs-read` flags to bypass security controls. Consequently, an attacker can use `fs.realpathSync.native()` to determine file existence, resolve symbolic link targets, and enumerate filesystem paths outside of permitted directories, leading to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21715"
},
{
"category": "external",
"summary": "RHBZ#2453152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21715"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.507000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions"
},
{
"cve": "CVE-2026-21716",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2026-03-30T20:01:51.136802+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453157"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. An incomplete security fix allows code operating under restricted file system write permissions to bypass these limitations. This vulnerability enables the modification of file permissions and ownership on already-open files, even when explicit write access is denied. Such a bypass could lead to unauthorized changes to system files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21716"
},
{
"category": "external",
"summary": "RHBZ#2453157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21716"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.538000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix."
},
{
"cve": "CVE-2026-21717",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"discovery_date": "2026-03-30T20:02:10.986695+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453162"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in V8\u0027s string hashing mechanism within Node.js. A remote attacker can exploit this vulnerability by crafting requests containing integer-like strings. These specially crafted strings cause predictable hash collisions in V8\u0027s internal string table, particularly when processed by functions like JSON.parse() on attacker-controlled input. This can significantly degrade the performance of the Node.js process, leading to a Denial of Service (DoS) condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21717"
},
{
"category": "external",
"summary": "RHBZ#2453162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21717"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.415000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions"
},
{
"cve": "CVE-2026-25547",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-02-04T22:01:11.784120+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436942"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "RHBZ#2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"category": "external",
"summary": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"release_date": "2026-02-04T21:51:17.198000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27135",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-18T19:02:13.823002+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448754"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"category": "external",
"summary": "RHBZ#2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
"url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
}
],
"release_date": "2026-03-18T17:59:02.045000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T20:27:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7350"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-debugsource-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-devel-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-docs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-full-i18n-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-libs-debuginfo-1:24.14.1-2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-nodemon-0:3.0.3-3.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-0:2021.06-6.module+el9.7.0+24166+51c9666b.src::nodejs:24",
"AppStream-9.7.0.Z.MAIN:nodejs-packaging-bundler-0:2021.06-6.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:npm-1:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b.noarch::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.aarch64::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.ppc64le::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.s390x::nodejs:24",
"AppStream-9.7.0.Z.MAIN:v8-13.6-devel-3:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b.x86_64::nodejs:24"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination"
}
]
}
RHSA-2026:7123
Vulnerability from csaf_redhat - Published: 2026-04-08 18:17 - Updated: 2026-04-30 13:11A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.
A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).
A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:22 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7123",
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "RHEL-154019",
"url": "https://issues.redhat.com/browse/RHEL-154019"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7123.json"
}
],
"title": "Red Hat Security Advisory: nodejs:22 security update",
"tracking": {
"current_release_date": "2026-04-30T13:11:24+00:00",
"generator": {
"date": "2026-04-30T13:11:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7123",
"initial_release_date": "2026-04-08T18:17:58+00:00",
"revision_history": [
{
"date": "2026-04-08T18:17:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-08T18:17:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T13:11:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=src\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src (nodejs:22)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=src\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"product": {
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src (nodejs:22)",
"product_id": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-6.module%2Bel8.10.0%2B24148%2B847b6786?arch=src\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"product": {
"name": "nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch (nodejs:22)",
"product_id": "nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"product": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch (nodejs:22)",
"product_id": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=noarch\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"product": {
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch (nodejs:22)",
"product_id": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@2021.06-6.module%2Bel8.10.0%2B24148%2B847b6786?arch=noarch\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"product": {
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch (nodejs:22)",
"product_id": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging-bundler@2021.06-6.module%2Bel8.10.0%2B24148%2B847b6786?arch=noarch\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel8.10.0%2B24148%2B847b6786?arch=aarch64\u0026epoch=3\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel8.10.0%2B24148%2B847b6786?arch=ppc64le\u0026epoch=3\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel8.10.0%2B24148%2B847b6786?arch=s390x\u0026epoch=3\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-libs-debuginfo@22.22.2-1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@10.9.7-1.22.22.2.1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
},
{
"category": "product_version",
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22)",
"product_id": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/v8-12.4-devel@12.4.254.21-1.22.22.2.1.module%2Bel8.10.0%2B24148%2B847b6786?arch=x86_64\u0026epoch=3\u0026rpmmod=nodejs:22:8100020260331102257:6d880403"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22"
},
"product_reference": "nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22"
},
"product_reference": "nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22"
},
"product_reference": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22"
},
"product_reference": "nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22"
},
"product_reference": "nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64 (nodejs:22) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
},
"product_reference": "v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"cve": "CVE-2026-21710",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-03-30T20:01:21.196629+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453151"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request that includes a header named `__proto__`. When a Node.js application processes this request and attempts to access distinct headers, it encounters an unhandled error, leading to an application crash. This can result in a Denial of Service (DoS), making the affected service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21710"
},
{
"category": "external",
"summary": "RHBZ#2453151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21710"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases",
"url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"
}
],
"release_date": "2026-03-30T19:07:28.558000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header"
},
{
"cve": "CVE-2026-25547",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-02-04T22:01:11.784120+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436942"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the brace-expansion component. This denial of service (DoS) vulnerability allows a remote attacker to provide specially crafted input containing repeated numeric brace ranges. This input causes the library to attempt an unbounded expansion, consuming excessive CPU and memory resources. This can lead to a system crash, impacting the availability of the service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "RHBZ#2436942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436942"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"category": "external",
"summary": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"release_date": "2026-02-04T21:51:17.198000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27135",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-18T19:02:13.823002+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448754"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nghttp2. Due to missing internal state validation, the library continues to process incoming data even after a session has been terminated. A remote attacker could exploit this by sending a specially crafted HTTP/2 frame, leading to an assertion failure and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27135"
},
{
"category": "external",
"summary": "RHBZ#2448754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448754"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27135"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1",
"url": "https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1"
},
{
"category": "external",
"summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6",
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6"
}
],
"release_date": "2026-03-18T17:59:02.045000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination"
},
{
"cve": "CVE-2026-27904",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-26T02:01:23.004531+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442922"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "RHBZ#2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74"
}
],
"release_date": "2026-02-26T01:07:42.693000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T18:17:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7123"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-debugsource-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-devel-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-docs-1:22.22.2-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-full-i18n-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-libs-debuginfo-1:22.22.2-1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-nodemon-0:3.0.1-1.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-0:2021.06-6.module+el8.10.0+24148+847b6786.src::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:nodejs-packaging-bundler-0:2021.06-6.module+el8.10.0+24148+847b6786.noarch::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:npm-1:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.aarch64::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.ppc64le::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.s390x::nodejs:22",
"AppStream-8.10.0.Z.MAIN.EUS:v8-12.4-devel-3:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786.x86_64::nodejs:22"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions"
}
]
}
RHSA-2026:9742
Vulnerability from csaf_redhat - Published: 2026-04-22 14:56 - Updated: 2026-05-02 14:32A flaw was found in Axios, a promise-based HTTP client. This vulnerability occurs because Axios does not correctly handle hostname normalization when evaluating NO_PROXY rules. An attacker can exploit this by crafting requests to loopback addresses (e.g., localhost. or [::1]) which bypass the NO_PROXY configuration and are routed through the configured proxy. This can lead to Server-Side Request Forgery (SSRF) vulnerabilities, enabling attackers to access sensitive internal or loopback services that should otherwise be protected.
A flaw was found in Python-Markdown. Parsing crafted markdown content containing malformed HTML-like sequences causes html.parser.HTMLParser to raise an unhandled AssertionError. This unhandled exception allows an attacker to cause an application crash and potentially disclose sensitive information via its stack trace.
A flaw was found in ajv. When the $data option is enabled, the value of the pattern keyword is passed directly to the JavaScript RegExp() constructor without sufficient validation. An attacker able to supply a malicious regular expression pattern can trigger a ReDoS (Regular Expression Denial of Service), causing the application to become unresponsive and resulting in a denial of service.
A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A security flaw was identified in the Orchestrator Plugin of Red Hat Developer Hub (Backstage). The issue occurs due to insufficient input validation in GraphQL query handling. An authenticated user can inject specially crafted input into API requests, which disrupts backend query processing. This results in the entire Backstage application crashing and restarting, leading to a platform-wide Denial of Service (DoS). As a result, legitimate users temporarily lose access to the platform.
A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.
A flaw was found in Underscore.js, a JavaScript utility library. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) attack by providing specially crafted recursive data structures. When these structures are processed by the _.flatten or _.isEqual functions, which lack a depth limit for recursion, a stack overflow occurs. This can make the application unavailable to legitimate users.
A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).
A flaw was found in Immutable.js, a library for persistent immutable data structures. This vulnerability, known as Prototype Pollution, allows an attacker with low privileges to inject unwanted properties into core JavaScript object prototypes without user interaction. By manipulating specific APIs such as mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject(), a remote attacker could potentially execute arbitrary code or cause a denial of service (DoS).
A flaw was found in SVGO, an SVG (Scalable Vector Graphics) Optimizer. This vulnerability allows a remote attacker to cause a Denial of Service (DoS) by submitting a specially crafted XML file. The application's failure to properly guard against XML entity expansion or recursion can lead to the Node.js process consuming excessive memory and crashing.
A flaw was found in Backstage. The backstage/plugin-techdocs-node package uses an allowlist to filter dangerous MkDocs configuration keys during the documentation build process. A gap in this allowlist allows attackers to craft an mkdocs.yml file that causes arbitrary Python code execution.
A denial of service flaw has been discovered in the flatted npm library. flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process.
A flaw was found in fast-xml-parser. A remote attacker can exploit this vulnerability by supplying specially crafted XML input containing numeric character references or standard XML entities. This input can bypass configured entity expansion limits, leading to excessive memory allocation and high CPU usage. The primary consequence is a Denial of Service (DoS), which can crash the affected process.
A flaw was found in flatted, a JavaScript Object Notation (JSON) parser designed for handling circular data structures. A remote attacker can exploit this vulnerability by providing specially crafted JSON input. The parse() function in flatted fails to properly validate string values used as array index keys, allowing an attacker to manipulate internal JavaScript object prototypes. This prototype pollution can enable an attacker to execute arbitrary code or cause a denial of service, impacting the availability and integrity of affected systems.
A flaw was found in the node-forge library, a JavaScript implementation of Transport Layer Security. This vulnerability, inherited from the bundled jsbn library, allows a remote attacker to cause a Denial of Service (DoS). When the BigInteger.modInverse() function is called with a zero value, it enters an infinite loop, causing the process to hang indefinitely and consume 100% of the CPU resources.
A flaw was found in Forge (also called `node-forge`), a JavaScript implementation of Transport Layer Security. A remote attacker could exploit weaknesses in the RSASSA PKCS#1 v1.5 signature verification process. By crafting malicious signatures that include extra data within the ASN structure and do not meet padding requirements, an attacker can bypass signature validation. This allows for the creation of forged signatures that appear legitimate, potentially compromising the integrity and authenticity of communications.
A flaw was found in Forge (also called `node-forge`), a JavaScript library used for Transport Layer Security (TLS). The library's Ed25519 signature verification process does not correctly validate cryptographic signatures, allowing forged non-canonical signatures to be accepted. A remote attacker could exploit this signature malleability to bypass authentication and authorization logic. This vulnerability can also circumvent security checks in applications that rely on the uniqueness of cryptographic signatures for functions such as deduplication or preventing replay attacks.
A flaw was found in Forge (also known as node-forge), a JavaScript implementation of Transport Layer Security (TLS). The `pki.verifyCertificateChain()` function does not properly enforce certificate validation rules. This oversight allows an intermediate certificate that lacks specific security extensions to enable any leaf certificate to function as a Certificate Authority (CA) and sign other certificates. Consequently, node-forge could accept these unauthorized certificates as valid, potentially leading to spoofing or the issuance of illegitimate certificates.
A flaw was found in basic-ftp, an FTP client for Node.js. A remote attacker can exploit this vulnerability by injecting Carriage Return Line Feed (CRLF) sequences into file path parameters used by high-level APIs. This allows the attacker to split a single intended FTP command into multiple commands. Such command injection can lead to the execution of arbitrary commands, potentially compromising the integrity and availability of data or the system.
A flaw was found in Axios, a promise-based HTTP client. This vulnerability, known as Prototype Pollution, can be exploited through a specific "Gadget" attack chain. This allows an attacker to escalate a Prototype Pollution vulnerability in a third-party dependency, potentially leading to remote code execution or a full cloud compromise, such as bypassing AWS IMDSv2.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Developer Hub 1.8.6 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Developer Hub (RHDH) is Red Hat\u0027s enterprise-grade, self-managed, customizable developer portal based on Backstage.io. RHDH is supported on OpenShift and other major Kubernetes clusters (AKS, EKS, GKE). The core features of RHDH include a single pane of glass, a centralized software catalog, self-service via golden path templates, and Tech Docs. RHDH is extensible by plugins.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9742",
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-62718",
"url": "https://access.redhat.com/security/cve/CVE-2025-62718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69534",
"url": "https://access.redhat.com/security/cve/CVE-2025-69534"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69873",
"url": "https://access.redhat.com/security/cve/CVE-2025-69873"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1525",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1526",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1528",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-2229",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-26996",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27601",
"url": "https://access.redhat.com/security/cve/CVE-2026-27601"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27904",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29063",
"url": "https://access.redhat.com/security/cve/CVE-2026-29063"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29074",
"url": "https://access.redhat.com/security/cve/CVE-2026-29074"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29186",
"url": "https://access.redhat.com/security/cve/CVE-2026-29186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3118",
"url": "https://access.redhat.com/security/cve/CVE-2026-3118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32141",
"url": "https://access.redhat.com/security/cve/CVE-2026-32141"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33036",
"url": "https://access.redhat.com/security/cve/CVE-2026-33036"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33228",
"url": "https://access.redhat.com/security/cve/CVE-2026-33228"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33891",
"url": "https://access.redhat.com/security/cve/CVE-2026-33891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33894",
"url": "https://access.redhat.com/security/cve/CVE-2026-33894"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33895",
"url": "https://access.redhat.com/security/cve/CVE-2026-33895"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33896",
"url": "https://access.redhat.com/security/cve/CVE-2026-33896"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-39983",
"url": "https://access.redhat.com/security/cve/CVE-2026-39983"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40175",
"url": "https://access.redhat.com/security/cve/CVE-2026-40175"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4800",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4926",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh",
"url": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh"
},
{
"category": "external",
"summary": "https://developers.redhat.com/rhdh/overview",
"url": "https://developers.redhat.com/rhdh/overview"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_developer_hub",
"url": "https://docs.redhat.com/en/documentation/red_hat_developer_hub"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHDHBUGS-2288",
"url": "https://issues.redhat.com/browse/RHDHBUGS-2288"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHDHBUGS-2947",
"url": "https://issues.redhat.com/browse/RHDHBUGS-2947"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHDHBUGS-2972",
"url": "https://issues.redhat.com/browse/RHDHBUGS-2972"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12327",
"url": "https://issues.redhat.com/browse/RHIDP-12327"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12388",
"url": "https://issues.redhat.com/browse/RHIDP-12388"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12419",
"url": "https://issues.redhat.com/browse/RHIDP-12419"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12511",
"url": "https://issues.redhat.com/browse/RHIDP-12511"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12568",
"url": "https://issues.redhat.com/browse/RHIDP-12568"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12647",
"url": "https://issues.redhat.com/browse/RHIDP-12647"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12650",
"url": "https://issues.redhat.com/browse/RHIDP-12650"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12655",
"url": "https://issues.redhat.com/browse/RHIDP-12655"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12666",
"url": "https://issues.redhat.com/browse/RHIDP-12666"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12686",
"url": "https://issues.redhat.com/browse/RHIDP-12686"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12784",
"url": "https://issues.redhat.com/browse/RHIDP-12784"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12880",
"url": "https://issues.redhat.com/browse/RHIDP-12880"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12887",
"url": "https://issues.redhat.com/browse/RHIDP-12887"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12921",
"url": "https://issues.redhat.com/browse/RHIDP-12921"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12930",
"url": "https://issues.redhat.com/browse/RHIDP-12930"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12996",
"url": "https://issues.redhat.com/browse/RHIDP-12996"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13105",
"url": "https://issues.redhat.com/browse/RHIDP-13105"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13107",
"url": "https://issues.redhat.com/browse/RHIDP-13107"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13130",
"url": "https://issues.redhat.com/browse/RHIDP-13130"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13180",
"url": "https://issues.redhat.com/browse/RHIDP-13180"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13182",
"url": "https://issues.redhat.com/browse/RHIDP-13182"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13185",
"url": "https://issues.redhat.com/browse/RHIDP-13185"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9742.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Developer Hub 1.8.6 release.",
"tracking": {
"current_release_date": "2026-05-02T14:32:55+00:00",
"generator": {
"date": "2026-05-02T14:32:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:9742",
"initial_release_date": "2026-04-22T14:56:38+00:00",
"revision_history": [
{
"date": "2026-04-22T14:56:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-22T14:56:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-02T14:32:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Hub 1.8",
"product": {
"name": "Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhdh:1.8::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Hub"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-hub-rhel9@sha256%3Abb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1776784286"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-rhel9-operator@sha256%3Af09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1776783947"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-operator-bundle@sha256%3Ab40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1776787729"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62718",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-09T15:01:48.111177+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456913"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Axios, a promise-based HTTP client. This vulnerability occurs because Axios does not correctly handle hostname normalization when evaluating NO_PROXY rules. An attacker can exploit this by crafting requests to loopback addresses (e.g., localhost. or [::1]) which bypass the NO_PROXY configuration and are routed through the configured proxy. This can lead to Server-Side Request Forgery (SSRF) vulnerabilities, enabling attackers to access sensitive internal or loopback services that should otherwise be protected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios: Server-Side Request Forgery and proxy bypass due to improper hostname normalization",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has limited impact due to combination of non-default conditions to exploit: the attacker must be able to control or influence URLs passed to axios in a server-side context, the application must have both `HTTP_PROXY` and `NO_PROXY` configured, and the proxy itself must be positioned to act on the misdirected traffic or have been compromised by the attacker to intercept the rerouted traffic.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62718"
},
{
"category": "external",
"summary": "RHBZ#2456913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62718"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc1034#section-3.1",
"url": "https://datatracker.ietf.org/doc/html/rfc1034#section-3.1"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2",
"url": "https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/fb3befb6daac6cad26b2e54094d0f2d9e47f24df",
"url": "https://github.com/axios/axios/commit/fb3befb6daac6cad26b2e54094d0f2d9e47f24df"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/10661",
"url": "https://github.com/axios/axios/pull/10661"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.15.0",
"url": "https://github.com/axios/axios/releases/tag/v1.15.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-3p68-rc4w-qgx5",
"url": "https://github.com/axios/axios/security/advisories/GHSA-3p68-rc4w-qgx5"
}
],
"release_date": "2026-04-09T14:31:46.067000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "axios: Axios: Server-Side Request Forgery and proxy bypass due to improper hostname normalization"
},
{
"cve": "CVE-2025-69534",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-05T16:01:10.432461+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444839"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Python-Markdown. Parsing crafted markdown content containing malformed HTML-like sequences causes html.parser.HTMLParser to raise an unhandled AssertionError. This unhandled exception allows an attacker to cause an application crash and potentially disclose sensitive information via its stack trace.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-markdown: denial of service via malformed HTML-like sequences",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to supply a specially crafted payload to be processed by an application using Python-Markdown. Additionally, the security impact of this vulnerability is limited to an information disclosure via the unhandled exception stack trace and a denial of service. There is no memory corruption or arbitrary command execution. Due to these reasons, this issue has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69534"
},
{
"category": "external",
"summary": "RHBZ#2444839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444839"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69534"
},
{
"category": "external",
"summary": "https://github.com/Python-Markdown/markdown",
"url": "https://github.com/Python-Markdown/markdown"
},
{
"category": "external",
"summary": "https://github.com/Python-Markdown/markdown/actions/runs/15736122892",
"url": "https://github.com/Python-Markdown/markdown/actions/runs/15736122892"
},
{
"category": "external",
"summary": "https://github.com/Python-Markdown/markdown/issues/1534",
"url": "https://github.com/Python-Markdown/markdown/issues/1534"
}
],
"release_date": "2026-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, wrap your markdown parsing function in a try/except block. This catches the unhandled exception, preventing both the application crash and the stack trace leak.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "python-markdown: denial of service via malformed HTML-like sequences"
},
{
"cve": "CVE-2025-69873",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-11T19:01:32.953264+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2439070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ajv. When the $data option is enabled, the value of the pattern keyword is passed directly to the JavaScript RegExp() constructor without sufficient validation. An attacker able to supply a malicious regular expression pattern can trigger a ReDoS (Regular Expression Denial of Service), causing the application to become unresponsive and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ajv: ReDoS via $data reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, the $data option must be enabled and the attacker needs to be able to send a payload with a specially crafted regular expression to the application processing the input. A 31-character payload causes approximately 44 seconds of execution, with each additional character doubling the execution time. Therefore, even a small payload can cause an application to become unresponsive and eventually result in a denial of service. Due to this reason, this flaw has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69873"
},
{
"category": "external",
"summary": "RHBZ#2439070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69873"
},
{
"category": "external",
"summary": "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69873-ajv-ReDoS.md",
"url": "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69873-ajv-ReDoS.md"
}
],
"release_date": "2026-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "To mitigate this issue, disable the $data feature if your application does not require it. If $data must be used, implement strict validation of the input fields that are referenced by the pattern keyword to ensure they contain only expected and safe characters.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ajv: ReDoS via $data reference"
},
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"acknowledgments": [
{
"names": [
"Thibault Guittet"
]
}
],
"cve": "CVE-2026-3118",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-02-24T12:08:42.955000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442273"
}
],
"notes": [
{
"category": "description",
"text": "A security flaw was identified in the Orchestrator Plugin of Red Hat Developer Hub (Backstage). The issue occurs due to insufficient input validation in GraphQL query handling. An authenticated user can inject specially crafted input into API requests, which disrupts backend query processing. This results in the entire Backstage application crashing and restarting, leading to a platform-wide Denial of Service (DoS). As a result, legitimate users temporarily lose access to the platform.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rhdh: GraphQL Injection Leading to Platform-Wide Denial of Service (DoS) in RH Developer Hub Orchestrator Plugin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in the Orchestrator Plugin of Red Hat Developer Hub (Backstage) allows an authenticated attacker to cause a platform-wide Denial of Service. By injecting specially crafted input into GraphQL API requests, an attacker can disrupt backend query processing, leading to the application crashing and restarting. This issue temporarily prevents legitimate users from accessing the platform.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3118"
},
{
"category": "external",
"summary": "RHBZ#2442273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3118"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3118",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3118"
}
],
"release_date": "2026-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict network access to the Red Hat Developer Hub instance to trusted users and networks only. This limits the exposure of the vulnerable Orchestrator Plugin to unauthorized access.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rhdh: GraphQL Injection Leading to Platform-Wide Denial of Service (DoS) in RH Developer Hub Orchestrator Plugin"
},
{
"cve": "CVE-2026-4800",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2026-03-31T20:01:21.918257+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453496"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the context of Red Hat Enterprise Linux, the grafana and grafana-pcp packages execute the affected JavaScript entirely client-side within the user\u0027s browser. Consequently, the attack surface is strictly restricted to the local browser environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "RHBZ#2453496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4800",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4800"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
"url": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
"url": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c"
}
],
"release_date": "2026-03-31T19:25:55.987000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports"
},
{
"cve": "CVE-2026-4926",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-03-26T20:03:28.427630+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw in `path-to-regexp` that can lead to a Denial of Service. The vulnerability occurs when specially crafted input containing multiple sequential optional groups is used to generate regular expressions, causing exponential resource consumption.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "RHBZ#2451867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4926",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4926"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
}
],
"release_date": "2026-03-26T18:59:38+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, limit the use of multiple sequential optional groups in route patterns within applications that use `path-to-regexp`. Additionally, avoid directly passing user-controlled input as route patterns to prevent the generation of maliciously crafted regular expressions.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-26996",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-20T04:01:11.896063+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441268"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this Regular Expression Denial of Service (ReDoS) vulnerability by providing a specially crafted glob pattern. This pattern, containing numerous consecutive wildcard characters, causes excessive processing and exponential backtracking in the regular expression engine. Successful exploitation leads to a Denial of Service (DoS), making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26996"
},
{
"category": "external",
"summary": "RHBZ#2441268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
"url": "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26"
}
],
"release_date": "2026-02-20T03:05:21.105000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns"
},
{
"cve": "CVE-2026-27601",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2026-03-03T23:01:58.011378+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444247"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Underscore.js, a JavaScript utility library. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) attack by providing specially crafted recursive data structures. When these structures are processed by the _.flatten or _.isEqual functions, which lack a depth limit for recursion, a stack overflow occurs. This can make the application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Underscore.js: Underscore.js: Denial of Service via recursive data structures in flatten and isEqual functions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27601"
},
{
"category": "external",
"summary": "RHBZ#2444247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27601",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27601"
},
{
"category": "external",
"summary": "https://github.com/jashkenas/underscore/commit/411e222eb0ca5d570cc4f6315c02c05b830ed2b4",
"url": "https://github.com/jashkenas/underscore/commit/411e222eb0ca5d570cc4f6315c02c05b830ed2b4"
},
{
"category": "external",
"summary": "https://github.com/jashkenas/underscore/commit/a6e23ae9647461ec33ad9f92a2ecfc220eea0a84",
"url": "https://github.com/jashkenas/underscore/commit/a6e23ae9647461ec33ad9f92a2ecfc220eea0a84"
},
{
"category": "external",
"summary": "https://github.com/jashkenas/underscore/security/advisories/GHSA-qpx9-hpmf-5gmw",
"url": "https://github.com/jashkenas/underscore/security/advisories/GHSA-qpx9-hpmf-5gmw"
}
],
"release_date": "2026-03-03T22:38:38.955000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications utilizing Underscore.js should ensure that any processing of untrusted, recursively structured data with `_.flatten` or `_.isEqual` explicitly enforces a finite depth limit. Review application code to identify and modify calls to these functions, adding appropriate depth parameters to prevent stack overflow conditions. Additionally, input validation should be implemented to sanitize untrusted data before it is processed by Underscore.js functions.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Underscore.js: Underscore.js: Denial of Service via recursive data structures in flatten and isEqual functions"
},
{
"cve": "CVE-2026-27904",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-26T02:01:23.004531+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442922"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "RHBZ#2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74"
}
],
"release_date": "2026-02-26T01:07:42.693000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions"
},
{
"cve": "CVE-2026-29063",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2026-03-06T19:00:57.982727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Immutable.js, a library for persistent immutable data structures. This vulnerability, known as Prototype Pollution, allows an attacker with low privileges to inject unwanted properties into core JavaScript object prototypes without user interaction. By manipulating specific APIs such as mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject(), a remote attacker could potentially execute arbitrary code or cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "immutable-js: Immutable.js: Arbitrary code execution via Prototype Pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this vulnerability requires that an attacker is able to provide arbitrary data to clients of this library in a way that calls the affected functions with data the attacker controls. In most deployments, the ability to provide data in this fashion requires that an attacker has some degree of privileges to access the affected applications.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29063"
},
{
"category": "external",
"summary": "RHBZ#2445291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw",
"url": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw"
}
],
"release_date": "2026-03-06T18:25:22.438000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "immutable-js: Immutable.js: Arbitrary code execution via Prototype Pollution"
},
{
"cve": "CVE-2026-29074",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2026-03-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445132"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SVGO, an SVG (Scalable Vector Graphics) Optimizer. This vulnerability allows a remote attacker to cause a Denial of Service (DoS) by submitting a specially crafted XML file. The application\u0027s failure to properly guard against XML entity expansion or recursion can lead to the Node.js process consuming excessive memory and crashing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "svgo: SVGO: Denial of Service via XML entity expansion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29074"
},
{
"category": "external",
"summary": "RHBZ#2445132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29074"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29074",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29074"
},
{
"category": "external",
"summary": "https://github.com/svg/svgo/security/advisories/GHSA-xpqw-6gx7-v673",
"url": "https://github.com/svg/svgo/security/advisories/GHSA-xpqw-6gx7-v673"
}
],
"release_date": "2026-03-06T07:23:05.716000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "svgo: SVGO: Denial of Service via XML entity expansion"
},
{
"cve": "CVE-2026-29186",
"cwe": {
"id": "CWE-791",
"name": "Incomplete Filtering of Special Elements"
},
"discovery_date": "2026-03-07T16:01:40.949207+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445480"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Backstage. The backstage/plugin-techdocs-node package uses an allowlist to filter dangerous MkDocs configuration keys during the documentation build process. A gap in this allowlist allows attackers to craft an mkdocs.yml file that causes arbitrary Python code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "backstage/plugin-techdocs-node: TechDocs Mkdocs configuration key enables arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs commit access to a repository that Backstage is configured to track and build in order to introduce a malicious mkdocs.yml file into the TechDocs build pipeline. Additionally, an attacker can execute arbitrary Python code but the payload is confined by the permissions granted to the TechDocs build process which is typically a restricted service account, limiting the impact of this vulnerability. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29186"
},
{
"category": "external",
"summary": "RHBZ#2445480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445480"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29186"
},
{
"category": "external",
"summary": "https://github.com/backstage/backstage/security/advisories/GHSA-928r-fm4v-mvrw",
"url": "https://github.com/backstage/backstage/security/advisories/GHSA-928r-fm4v-mvrw"
}
],
"release_date": "2026-03-07T15:03:51.422000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "To mitigate this issue, enable docker isolation by updating the Backstage configuration to use \u0027runIn: docker\u0027 instead of \u0027runIn: local\u0027, confining the arbitrary Python code execution to a containerized environment. Additionally, limit commit access to repositories tracked by Backstage to trusted contributors only, and enforce mandatory pull request (PR) reviews for any modifications made to the mkdocs.yml file.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "backstage/plugin-techdocs-node: TechDocs Mkdocs configuration key enables arbitrary code execution"
},
{
"cve": "CVE-2026-32141",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T19:01:30.987208+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447083"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the flatted npm library. flatted\u0027s parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flatted: flatted: Unbounded recursion DoS in parse() revive phase",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32141"
},
{
"category": "external",
"summary": "RHBZ#2447083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447083"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32141"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/commit/7eb65d857e1a40de11c47461cdbc8541449f0606",
"url": "https://github.com/WebReflection/flatted/commit/7eb65d857e1a40de11c47461cdbc8541449f0606"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/pull/88",
"url": "https://github.com/WebReflection/flatted/pull/88"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/security/advisories/GHSA-25h7-pfq9-p65f",
"url": "https://github.com/WebReflection/flatted/security/advisories/GHSA-25h7-pfq9-p65f"
}
],
"release_date": "2026-03-12T18:08:09.634000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flatted: flatted: Unbounded recursion DoS in parse() revive phase"
},
{
"cve": "CVE-2026-33036",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2026-03-20T06:02:18.306021+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in fast-xml-parser. A remote attacker can exploit this vulnerability by supplying specially crafted XML input containing numeric character references or standard XML entities. This input can bypass configured entity expansion limits, leading to excessive memory allocation and high CPU usage. The primary consequence is a Denial of Service (DoS), which can crash the affected process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fast-xml-parser: fast-xml-parser: Denial of Service via XML entity expansion bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33036"
},
{
"category": "external",
"summary": "RHBZ#2449458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33036",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33036"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33036",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33036"
},
{
"category": "external",
"summary": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/bd26122c838e6a55e7d7ac49b4ccc01a49999a01",
"url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/bd26122c838e6a55e7d7ac49b4ccc01a49999a01"
},
{
"category": "external",
"summary": "https://github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v5.5.6",
"url": "https://github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v5.5.6"
},
{
"category": "external",
"summary": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-8gc5-j5rx-235r",
"url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-8gc5-j5rx-235r"
}
],
"release_date": "2026-03-20T05:17:03.290000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fast-xml-parser: fast-xml-parser: Denial of Service via XML entity expansion bypass"
},
{
"cve": "CVE-2026-33228",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2026-03-21T00:01:43.424803+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in flatted, a JavaScript Object Notation (JSON) parser designed for handling circular data structures. A remote attacker can exploit this vulnerability by providing specially crafted JSON input. The parse() function in flatted fails to properly validate string values used as array index keys, allowing an attacker to manipulate internal JavaScript object prototypes. This prototype pollution can enable an attacker to execute arbitrary code or cause a denial of service, impacting the availability and integrity of affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A Critical vulnerability was discovered in \u0027flatted\u0027, a JavaScript JSON parser. It could enable a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service. Exploitation involves prototype pollution by providing a specially crafted JSON input. Red Hat products that process un-trusted JSON data and utilize the \u0027flatted\u0027 library are at risk if they do not properly sanitize input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33228"
},
{
"category": "external",
"summary": "RHBZ#2449872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33228"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/commit/885ddcc33cf9657caf38c57c7be45ae1c5272802",
"url": "https://github.com/WebReflection/flatted/commit/885ddcc33cf9657caf38c57c7be45ae1c5272802"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/releases/tag/v3.4.2",
"url": "https://github.com/WebReflection/flatted/releases/tag/v3.4.2"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/security/advisories/GHSA-rf6f-7fwh-wjgh",
"url": "https://github.com/WebReflection/flatted/security/advisories/GHSA-rf6f-7fwh-wjgh"
}
],
"release_date": "2026-03-20T23:06:48.485000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON."
},
{
"cve": "CVE-2026-33891",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2026-03-27T21:01:34.410210+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452450"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the node-forge library, a JavaScript implementation of Transport Layer Security. This vulnerability, inherited from the bundled jsbn library, allows a remote attacker to cause a Denial of Service (DoS). When the BigInteger.modInverse() function is called with a zero value, it enters an infinite loop, causing the process to hang indefinitely and consume 100% of the CPU resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Denial of Service via infinite loop in BigInteger.modInverse()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33891"
},
{
"category": "external",
"summary": "RHBZ#2452450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33891",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33891"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/9bb8d67b99d17e4ebb5fd7596cd699e11f25d023",
"url": "https://github.com/digitalbazaar/forge/commit/9bb8d67b99d17e4ebb5fd7596cd699e11f25d023"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5m6q-g25r-mvwx",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5m6q-g25r-mvwx"
}
],
"release_date": "2026-03-27T20:43:37.725000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Denial of Service via infinite loop in BigInteger.modInverse()"
},
{
"cve": "CVE-2026-33894",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2026-03-27T21:02:52.462999+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452464"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Forge (also called `node-forge`), a JavaScript implementation of Transport Layer Security. A remote attacker could exploit weaknesses in the RSASSA PKCS#1 v1.5 signature verification process. By crafting malicious signatures that include extra data within the ASN structure and do not meet padding requirements, an attacker can bypass signature validation. This allows for the creation of forged signatures that appear legitimate, potentially compromising the integrity and authenticity of communications.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: Forge: Signature Forgery via Weak RSASSA PKCS#1 v1.5 Verification",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33894"
},
{
"category": "external",
"summary": "RHBZ#2452464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33894",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33894"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33894",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33894"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2313#section-8",
"url": "https://datatracker.ietf.org/doc/html/rfc2313#section-8"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-ppp5-5v6c-4jwp",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-ppp5-5v6c-4jwp"
},
{
"category": "external",
"summary": "https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE",
"url": "https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc8017.html",
"url": "https://www.rfc-editor.org/rfc/rfc8017.html"
}
],
"release_date": "2026-03-27T20:45:49.583000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: Forge: Signature Forgery via Weak RSASSA PKCS#1 v1.5 Verification"
},
{
"cve": "CVE-2026-33895",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2026-03-27T21:02:18.484291+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452457"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Forge (also called `node-forge`), a JavaScript library used for Transport Layer Security (TLS). The library\u0027s Ed25519 signature verification process does not correctly validate cryptographic signatures, allowing forged non-canonical signatures to be accepted. A remote attacker could exploit this signature malleability to bypass authentication and authorization logic. This vulnerability can also circumvent security checks in applications that rely on the uniqueness of cryptographic signatures for functions such as deduplication or preventing replay attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: Forge: Authentication bypass via forged Ed25519 cryptographic signatures",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33895"
},
{
"category": "external",
"summary": "RHBZ#2452457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452457"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33895",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33895"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc8032#section-8.4",
"url": "https://datatracker.ietf.org/doc/html/rfc8032#section-8.4"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/bdecf11571c9f1a487cc0fe72fe78ff6dfa96b85",
"url": "https://github.com/digitalbazaar/forge/commit/bdecf11571c9f1a487cc0fe72fe78ff6dfa96b85"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-q67f-28xg-22rw",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-q67f-28xg-22rw"
}
],
"release_date": "2026-03-27T20:47:54.492000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: Forge: Authentication bypass via forged Ed25519 cryptographic signatures"
},
{
"cve": "CVE-2026-33896",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-27T21:02:22.762233+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Forge (also known as node-forge), a JavaScript implementation of Transport Layer Security (TLS). The `pki.verifyCertificateChain()` function does not properly enforce certificate validation rules. This oversight allows an intermediate certificate that lacks specific security extensions to enable any leaf certificate to function as a Certificate Authority (CA) and sign other certificates. Consequently, node-forge could accept these unauthorized certificates as valid, potentially leading to spoofing or the issuance of illegitimate certificates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: Forge (node-forge): Certificate validation bypass allows unauthorized certificate issuance",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33896"
},
{
"category": "external",
"summary": "RHBZ#2452458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33896",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33896"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/2e492832fb25227e6b647cbe1ac981c123171e90",
"url": "https://github.com/digitalbazaar/forge/commit/2e492832fb25227e6b647cbe1ac981c123171e90"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2328-f5f3-gj25",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2328-f5f3-gj25"
}
],
"release_date": "2026-03-27T20:50:03.418000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: Forge (node-forge): Certificate validation bypass allows unauthorized certificate issuance"
},
{
"cve": "CVE-2026-39983",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"discovery_date": "2026-04-09T18:02:16.209487+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456971"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in basic-ftp, an FTP client for Node.js. A remote attacker can exploit this vulnerability by injecting Carriage Return Line Feed (CRLF) sequences into file path parameters used by high-level APIs. This allows the attacker to split a single intended FTP command into multiple commands. Such command injection can lead to the execution of arbitrary commands, potentially compromising the integrity and availability of data or the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "basic-ftp: basic-ftp: Command injection via CRLF sequences in file path parameters",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-39983"
},
{
"category": "external",
"summary": "RHBZ#2456971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456971"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-39983",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-39983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39983"
},
{
"category": "external",
"summary": "https://github.com/patrickjuchli/basic-ftp/commit/2ecc8e2c500c5234115f06fd1dbde1aa03d70f4b",
"url": "https://github.com/patrickjuchli/basic-ftp/commit/2ecc8e2c500c5234115f06fd1dbde1aa03d70f4b"
},
{
"category": "external",
"summary": "https://github.com/patrickjuchli/basic-ftp/releases/tag/v5.2.1",
"url": "https://github.com/patrickjuchli/basic-ftp/releases/tag/v5.2.1"
},
{
"category": "external",
"summary": "https://github.com/patrickjuchli/basic-ftp/security/advisories/GHSA-chqc-8p9q-pq6q",
"url": "https://github.com/patrickjuchli/basic-ftp/security/advisories/GHSA-chqc-8p9q-pq6q"
}
],
"release_date": "2026-04-09T17:05:46.228000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "basic-ftp: basic-ftp: Command injection via CRLF sequences in file path parameters"
},
{
"cve": "CVE-2026-40175",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2026-04-10T20:02:10.296601+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Axios, a promise-based HTTP client. This vulnerability, known as Prototype Pollution, can be exploited through a specific \"Gadget\" attack chain. This allows an attacker to escalate a Prototype Pollution vulnerability in a third-party dependency, potentially leading to remote code execution or a full cloud compromise, such as bypassing AWS IMDSv2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios: Remote Code Execution via Prototype Pollution escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Axios library, a promise-based HTTP client, is susceptible to an Important prototype pollution vulnerability. This flaw, when combined with specific \"Gadget\" attack chains in third-party dependencies, can lead to remote code execution or full cloud compromise, including bypassing AWS IMDSv2.\n \nWith pollution check patch available in Axios gives an advantage, it remains vulnerable due to HTTP Header Sanitation and Server-Side Request Forgery threat.\n\nRed Hat products that incorporate the vulnerable Axios library are affected.\n\nThe openshift4/ose-monitoring-plugin-rhel9 container image is not vulnerable to this flaw. The affected component is used as a build-time dependency but it\u0027s not shipped in the final product, meaning the flaw is not present thus cannot be exploited in the container deployments.\n\nRegarding openshift4/ose-console for Product stream 4.12 and 4.13, the vulnerable component is present (indirect dependency), but the vulnerability is not exploitable in our case due to the browser runtime, where the required Node.js-specific attack vectors are not available. With this, the impact becomes low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40175"
},
{
"category": "external",
"summary": "RHBZ#2457432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40175"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40175",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40175"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/363185461b90b1b78845dc8a99a1f103d9b122a1",
"url": "https://github.com/axios/axios/commit/363185461b90b1b78845dc8a99a1f103d9b122a1"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/10660",
"url": "https://github.com/axios/axios/pull/10660"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.15.0",
"url": "https://github.com/axios/axios/releases/tag/v1.15.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx",
"url": "https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx"
}
],
"release_date": "2026-04-10T19:23:52.285000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-22T14:56:38+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9742"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:bb763e2b7a9d101f73b03b9e1c5688e7034fd9d31413e890817bd4098a7d42f9_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:b40f228ed49b81e675763d0bb1e38e7a45c45eef8003237abfbddbfb952bb331_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:f09d63af77eec6b131067a08b1bd3a8c7673f9e68325bfde1ae081f85d73598c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "axios: Axios: Remote Code Execution via Prototype Pollution escalation"
}
]
}
CERTFR-2026-AVI-0500
Vulnerability from certfr_avis - Published: 2026-04-27 - Updated: 2026-04-27
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Platform Extension Framework versions ant\u00e9rieures \u00e0 8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12384"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"name": "CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"name": "CVE-2026-33871",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33871"
},
{
"name": "CVE-2026-22737",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22737"
},
{
"name": "CVE-2026-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3449"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2021-21409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21409"
},
{
"name": "CVE-2026-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22036"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2026-24098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24098"
},
{
"name": "CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"name": "CVE-2026-24734",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24734"
},
{
"name": "CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2025-56200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-56200"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2026-1527",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1527"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2026-41239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41239"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2023-34610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34610"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2026-34486",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34486"
},
{
"name": "CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"name": "CVE-2018-1320",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1320"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2026-29145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29145"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-49128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49128"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"name": "CVE-2020-10650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10650"
},
{
"name": "CVE-2025-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1647"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2019-20444",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
},
{
"name": "CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2026-33870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33870"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2020-13949",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13949"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2025-54550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54550"
},
{
"name": "CVE-2025-54920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54920"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2025-33042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33042"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2026-34500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34500"
},
{
"name": "CVE-2025-9624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9624"
},
{
"name": "CVE-2026-34043",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34043"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2025-62718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62718"
},
{
"name": "CVE-2026-4800",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4800"
},
{
"name": "CVE-2026-33671",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33671"
},
{
"name": "CVE-2026-33532",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33532"
},
{
"name": "CVE-2025-68470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68470"
},
{
"name": "CVE-2025-67721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67721"
},
{
"name": "CVE-2024-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23454"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"name": "CVE-2019-14439",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14439"
},
{
"name": "CVE-2026-33750",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33750"
},
{
"name": "CVE-2025-66236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66236"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2024-48910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48910"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-11143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11143"
},
{
"name": "CVE-2026-34480",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34480"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2026-33228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33228"
},
{
"name": "CVE-2025-12758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12758"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2026-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40175"
},
{
"name": "CVE-2024-57083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57083"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2024-23953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23953"
},
{
"name": "CVE-2026-29074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29074"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2026-41240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41240"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2024-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53382"
},
{
"name": "CVE-2018-12022",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12022"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2021-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2025-27821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27821"
},
{
"name": "CVE-2022-41404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41404"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2026-22732",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22732"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2026-34487",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34487"
},
{
"name": "CVE-2025-27555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27555"
},
{
"name": "CVE-2025-65995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65995"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2026-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2950"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2019-12814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12814"
},
{
"name": "CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2025-68458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68458"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2026-25854",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25854"
},
{
"name": "CVE-2021-22573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22573"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2026-2332",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2332"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"name": "CVE-2019-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2026-33672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33672"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2023-42503",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42503"
},
{
"name": "CVE-2024-56373",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56373"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2026-22735",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22735"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2025-68157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68157"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2018-11307",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11307"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2025-68675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68675"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2026-34483",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34483"
},
{
"name": "CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"name": "CVE-2026-32141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32141"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2026-33816",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33816"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2026-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25219"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2019-20445",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20445"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"initial_release_date": "2026-04-27T00:00:00",
"last_revision_date": "2026-04-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0500",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2026-04-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37405"
},
{
"published_at": "2026-04-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37404"
}
]
}
GHSA-2MJP-6Q6P-2QXM
Vulnerability from github – Published: 2026-03-13 20:07 – Updated: 2026-03-13 20:07Impact
Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire.
Who is impacted:
- Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays
- Applications that accept user-controlled header names without case-normalization
Potential consequences:
- Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request)
- HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking
Patches
Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.
Workarounds
If upgrading is not immediately possible:
- Validate header names: Ensure no duplicate
Content-Lengthheaders (case-insensitive) are present before passing headers to undici - Use object format: Pass headers as a plain object (
{ 'content-length': '123' }) rather than an array, which naturally deduplicates by key - Sanitize user input: If headers originate from user input, normalize header names to lowercase and reject duplicates
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "undici"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.24.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "undici"
},
"ranges": [
{
"events": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.24.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-1525"
],
"database_specific": {
"cwe_ids": [
"CWE-444"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-13T20:07:03Z",
"nvd_published_at": "2026-03-12T20:16:02Z",
"severity": "MODERATE"
},
"details": "### Impact\n\nUndici allows duplicate HTTP `Content-Length` headers when they are provided in an array with case-variant names (e.g., `Content-Length` and `content-length`). This produces malformed HTTP/1.1 requests with multiple conflicting `Content-Length` values on the wire.\n\n**Who is impacted:**\n - Applications using `undici.request()`, `undici.Client`, or similar low-level APIs with headers passed as flat arrays\n - Applications that accept user-controlled header names without case-normalization\n\n**Potential consequences:**\n - **Denial of Service**: Strict HTTP parsers (proxies, servers) will reject requests with duplicate `Content-Length` headers (400 Bad Request)\n - **HTTP Request Smuggling**: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking\n\n### Patches\n\n Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.\n\n### Workarounds\n\n If upgrading is not immediately possible:\n\n 1. **Validate header names**: Ensure no duplicate `Content-Length` headers (case-insensitive) are present before passing headers to undici\n 2. **Use object format**: Pass headers as a plain object (`{ \u0027content-length\u0027: \u0027123\u0027 }`) rather than an array, which naturally deduplicates by key\n 3. **Sanitize user input**: If headers originate from user input, normalize header names to lowercase and reject duplicates",
"id": "GHSA-2mjp-6q6p-2qxm",
"modified": "2026-03-13T20:07:03Z",
"published": "2026-03-13T20:07:03Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/3556037"
},
{
"type": "WEB",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"type": "WEB",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"type": "PACKAGE",
"url": "https://github.com/nodejs/undici"
},
{
"type": "WEB",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"type": "CVSS_V3"
}
],
"summary": "Undici has an HTTP Request/Response Smuggling issue"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.