Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:1843 - Security Advisory
Issued:
2026-02-03
Updated:
2026-02-05

RHSA-2026:1843 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nodejs22 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for nodejs22 is now available for Red Hat Enterprise Linux 10.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.

Security Fix(es):

  • nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
  • nodejs: Nodejs denial of service (CVE-2026-21637)
  • nodejs: Nodejs denial of service (CVE-2025-59466)
  • nodejs: Nodejs denial of service (CVE-2025-59465)
  • nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
  • nodejs: Nodejs file permissions bypass (CVE-2025-55130)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 10 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 10 s390x
  • Red Hat Enterprise Linux for Power, little endian 10 ppc64le
  • Red Hat Enterprise Linux for ARM 64 10 aarch64

Fixes

  • BZ - 2431338 - CVE-2025-55132 nodejs: Nodejs filesystem permissions bypass
  • BZ - 2431340 - CVE-2026-21637 nodejs: Nodejs denial of service
  • BZ - 2431343 - CVE-2025-59466 nodejs: Nodejs denial of service
  • BZ - 2431349 - CVE-2025-59465 nodejs: Nodejs denial of service
  • BZ - 2431350 - CVE-2025-55131 nodejs: Nodejs uninitialized memory exposure
  • BZ - 2431352 - CVE-2025-55130 nodejs: Nodejs file permissions bypass

CVEs

  • CVE-2025-55130
  • CVE-2025-55131
  • CVE-2025-55132
  • CVE-2025-59465
  • CVE-2025-59466
  • CVE-2026-21637

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 10

SRPM
nodejs22-22.22.0-3.el10_1.src.rpm SHA-256: a1461e0ede6b229b2f9fd0c41735d099735b3e8440c89100c1b3a2be5b913466
x86_64
nodejs-22.22.0-3.el10_1.x86_64.rpm SHA-256: 0b6908d51636100fa78d0578584dab6c3904f243ca27acb4d07e176c6f655450
nodejs-debuginfo-22.22.0-3.el10_1.x86_64.rpm SHA-256: e9c76b1d33cf7a7a6d1b6691b876e9575bfc444add9454af9dca1b9729ffc8a6
nodejs-devel-22.22.0-3.el10_1.x86_64.rpm SHA-256: 8c8b05d23d4e7e1d586d9808dac0be1bbb3d156e82ac4ca8e397acb4472060f5
nodejs-docs-22.22.0-3.el10_1.noarch.rpm SHA-256: f0a0d6478aae9747ca81d79b21145522748fc0b99c5e616a65932592aba3fbc4
nodejs-full-i18n-22.22.0-3.el10_1.x86_64.rpm SHA-256: fd271673592b7683c13857e9f99adac88181d8099b08c95b3be7c1b77e3c8c28
nodejs-libs-22.22.0-3.el10_1.x86_64.rpm SHA-256: ccedaa4c8b65d998f32d9d6e1a01914f4b0876797bfbce9ef659be6d431b3b7e
nodejs-libs-debuginfo-22.22.0-3.el10_1.x86_64.rpm SHA-256: 0d627f97bf91402fd5670d5207fa0768bf61956f0e4eb274cb2a17c46f3946fd
nodejs-npm-10.9.4-1.22.22.0.3.el10_1.x86_64.rpm SHA-256: 661d27f91435b3ddd5921bba8fb96247bf73bf45964ce8ef5907724fe8411bcc
nodejs22-debuginfo-22.22.0-3.el10_1.x86_64.rpm SHA-256: 049d558f6c741e08d83ec49fed5081f1d31a51ed0618eced697d8ff12d4ceff6
nodejs22-debugsource-22.22.0-3.el10_1.x86_64.rpm SHA-256: 96a8de846411cc5e10dd57a348a29bbec5c96d5441633ceec70699108ab69bf0

Red Hat Enterprise Linux for IBM z Systems 10

SRPM
nodejs22-22.22.0-3.el10_1.src.rpm SHA-256: a1461e0ede6b229b2f9fd0c41735d099735b3e8440c89100c1b3a2be5b913466
s390x
nodejs-22.22.0-3.el10_1.s390x.rpm SHA-256: 7819a59dd1bf758452b6805cb60db3ed850cc5792d87e11b68b9f045dffb7128
nodejs-debuginfo-22.22.0-3.el10_1.s390x.rpm SHA-256: b13cf707ef5d6b676ca2adbcd5b6222dcc06cf13eb65b29e6072df38d3bc8e71
nodejs-devel-22.22.0-3.el10_1.s390x.rpm SHA-256: 12f2ea2254510cd06f1b1dc6effe3eaff040db7a213e123ee1d8eea88e2984d9
nodejs-docs-22.22.0-3.el10_1.noarch.rpm SHA-256: f0a0d6478aae9747ca81d79b21145522748fc0b99c5e616a65932592aba3fbc4
nodejs-full-i18n-22.22.0-3.el10_1.s390x.rpm SHA-256: 4ac0db32bd657d2e9176d04881da81f1d16470eb5fc6fb5a02cfed9f4624496d
nodejs-libs-22.22.0-3.el10_1.s390x.rpm SHA-256: b65588c7553e414ac49bbcdc1b43d5aa576c77d37044cb7e211d5ab5c0588fb7
nodejs-libs-debuginfo-22.22.0-3.el10_1.s390x.rpm SHA-256: ca8c488bef96c704ab37becb9c6f6f67355e954708746922709de0cdd4a07411
nodejs-npm-10.9.4-1.22.22.0.3.el10_1.s390x.rpm SHA-256: 5a59631935de3c892cb413fc44569c3f68aeb9fce12a2264bb3c53b49eb6aebc
nodejs22-debuginfo-22.22.0-3.el10_1.s390x.rpm SHA-256: 35dd9584935a139f7eeff8da0d40336affa147449335facc96f69342eb870659
nodejs22-debugsource-22.22.0-3.el10_1.s390x.rpm SHA-256: 0103971ed8b280bc41c7fc0ec12d0f558cce91d5e84a14d598a66edb1b049b27

Red Hat Enterprise Linux for Power, little endian 10

SRPM
nodejs22-22.22.0-3.el10_1.src.rpm SHA-256: a1461e0ede6b229b2f9fd0c41735d099735b3e8440c89100c1b3a2be5b913466
ppc64le
nodejs-22.22.0-3.el10_1.ppc64le.rpm SHA-256: 334aea07baac9c13d4078879e347a1dcdce1224a9c312dff2d2d9deae0707180
nodejs-debuginfo-22.22.0-3.el10_1.ppc64le.rpm SHA-256: 7a1cc00f65393e9ee595ea9d89503ea4733814956b9b345d9ab25c587d3ded31
nodejs-devel-22.22.0-3.el10_1.ppc64le.rpm SHA-256: 916bbc9c505ca834dde8c55f89d6935021b62652cb140e318fc68f7faf835ffd
nodejs-docs-22.22.0-3.el10_1.noarch.rpm SHA-256: f0a0d6478aae9747ca81d79b21145522748fc0b99c5e616a65932592aba3fbc4
nodejs-full-i18n-22.22.0-3.el10_1.ppc64le.rpm SHA-256: 42ead689a8aa9e5dc7d1c573d088ae170080ae0ad2ccf56518f734f461c24f07
nodejs-libs-22.22.0-3.el10_1.ppc64le.rpm SHA-256: fe3da4f5383511c5ad3cfa5d5f550529bea4d8d28f99d781b3897fc532b87ae7
nodejs-libs-debuginfo-22.22.0-3.el10_1.ppc64le.rpm SHA-256: 14593c81bee0138a6a6e95ccaaac082f4cdc8ef6dad5c65cf68a970a66a6734f
nodejs-npm-10.9.4-1.22.22.0.3.el10_1.ppc64le.rpm SHA-256: 50eb4bb655b2dabe5117298dbc7a51177185918419e0c0ca4e071dae99ae77af
nodejs22-debuginfo-22.22.0-3.el10_1.ppc64le.rpm SHA-256: e356242ac26bf864270dc32979a4a81fc87b3c05e634b7a48545fbb1e76008dd
nodejs22-debugsource-22.22.0-3.el10_1.ppc64le.rpm SHA-256: 4919422c1ac47eb4a86a2c41c8a5acbff940b864bb39bcc63ceee09904dae8de

Red Hat Enterprise Linux for ARM 64 10

SRPM
nodejs22-22.22.0-3.el10_1.src.rpm SHA-256: a1461e0ede6b229b2f9fd0c41735d099735b3e8440c89100c1b3a2be5b913466
aarch64
nodejs-22.22.0-3.el10_1.aarch64.rpm SHA-256: 103d6dc7de1130bf76066666b4f2909fe1c2ad7a4ade8c902e0269440c1c7829
nodejs-debuginfo-22.22.0-3.el10_1.aarch64.rpm SHA-256: 151b3e496618997eb971ac628712ecec6ba9fddd417d4cbf82c1d9d43582b8f4
nodejs-devel-22.22.0-3.el10_1.aarch64.rpm SHA-256: 78e353f2a7912dda23e4f98905493edb7f97307ba7500c87f31e26a58bc8db7b
nodejs-docs-22.22.0-3.el10_1.noarch.rpm SHA-256: f0a0d6478aae9747ca81d79b21145522748fc0b99c5e616a65932592aba3fbc4
nodejs-full-i18n-22.22.0-3.el10_1.aarch64.rpm SHA-256: d7021cfbec8dc1b5f122114910f43d24b2fb114a8677bb71a3707d0b27ac7b09
nodejs-libs-22.22.0-3.el10_1.aarch64.rpm SHA-256: cfe71c87f40acdc54d9544b53eb5c8b62a4f8f9c54d113e369eeb2e251d83951
nodejs-libs-debuginfo-22.22.0-3.el10_1.aarch64.rpm SHA-256: 02cefb059d174bc0a0936d73453a94e6fa184756c6b651d992404e089a355c86
nodejs-npm-10.9.4-1.22.22.0.3.el10_1.aarch64.rpm SHA-256: 13338bb9759b6b177e7e0869d6f44f45b0a87b3a56f1024c56157ad0e7f88263
nodejs22-debuginfo-22.22.0-3.el10_1.aarch64.rpm SHA-256: 5177d398b93a6af96fb13fff70439f931718130f8db8f2e922e25db4ac3f6680
nodejs22-debugsource-22.22.0-3.el10_1.aarch64.rpm SHA-256: e0ddff3da6f616dda2ec972eed29f770f7f3414c3981e91ff3abd2d7aaa18620

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility