Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:7080 - Security Advisory
Issued:
2026-04-08
Updated:
2026-04-08

RHSA-2026:7080 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nodejs22 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for nodejs22 is now available for Red Hat Enterprise Linux 10.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.

Security Fix(es):

  • brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)
  • minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
  • minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)
  • undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
  • undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
  • undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
  • undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
  • nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
  • Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 10 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 10 s390x
  • Red Hat Enterprise Linux for Power, little endian 10 ppc64le
  • Red Hat Enterprise Linux for ARM 64 10 aarch64

Fixes

  • BZ - 2436942 - CVE-2026-25547 brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion
  • BZ - 2441268 - CVE-2026-26996 minimatch: minimatch: Denial of Service via specially crafted glob patterns
  • BZ - 2442922 - CVE-2026-27904 minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
  • BZ - 2447142 - CVE-2026-1526 undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression
  • BZ - 2447143 - CVE-2026-2229 undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter
  • BZ - 2447144 - CVE-2026-1525 undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers
  • BZ - 2447145 - CVE-2026-1528 undici: undici: Denial of Service via crafted WebSocket frame with large length
  • BZ - 2448754 - CVE-2026-27135 nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination
  • BZ - 2453151 - CVE-2026-21710 Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header

CVEs

  • CVE-2026-1525
  • CVE-2026-1526
  • CVE-2026-1528
  • CVE-2026-2229
  • CVE-2026-21710
  • CVE-2026-25547
  • CVE-2026-26996
  • CVE-2026-27135
  • CVE-2026-27904

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 10

SRPM
nodejs22-22.22.2-1.el10_1.src.rpm SHA-256: 0fbadd833d5465e9542457d43692d6b39803f44ccd7865c7aa81f90332f7077a
x86_64
nodejs-22.22.2-1.el10_1.x86_64.rpm SHA-256: 35d57559d5e83f6f2867a0b0ad4eb1a94bee7e0be656dca2529a5dd312b37962
nodejs-debuginfo-22.22.2-1.el10_1.x86_64.rpm SHA-256: 42acf2fb99f5902350ec22f691cd585659f41ee0ef4e3163cf7dd16126d20023
nodejs-devel-22.22.2-1.el10_1.x86_64.rpm SHA-256: 9815f0fa24fd1bee10ee50513bdc73b85360c390c3ccabe18c062c435b9a071e
nodejs-docs-22.22.2-1.el10_1.noarch.rpm SHA-256: c2de925b62b21d28b187533741f61a3ff3a92661908c0955bd4a64be55ad16d0
nodejs-full-i18n-22.22.2-1.el10_1.x86_64.rpm SHA-256: a3881b37d08ea430fe5489149198c251e16cd594898e84ff8401d11725f4d50d
nodejs-libs-22.22.2-1.el10_1.x86_64.rpm SHA-256: 122d21feee824155652e6805932c91b0e5935887c0be306dab294e524c09636a
nodejs-libs-debuginfo-22.22.2-1.el10_1.x86_64.rpm SHA-256: d7c3877b657de3970d9df5c50b7f4772fd5e57dbfce8374dc2e5bb1899aa7c55
nodejs-npm-10.9.7-1.22.22.2.1.el10_1.x86_64.rpm SHA-256: df7509797fa24e28116e4b9fc8f530d1f2d88aa470b383902a7a709c04dfc22e
nodejs22-debuginfo-22.22.2-1.el10_1.x86_64.rpm SHA-256: f2a6497920da57a44e0f0383fcf32dbe19a42deb96179cbfc16f3fe5680d3fce
nodejs22-debugsource-22.22.2-1.el10_1.x86_64.rpm SHA-256: 1efda41c4778f6541c9ae9f10cac3fa8e52391c3f678bf99645bffca9ee5843b

Red Hat Enterprise Linux for IBM z Systems 10

SRPM
nodejs22-22.22.2-1.el10_1.src.rpm SHA-256: 0fbadd833d5465e9542457d43692d6b39803f44ccd7865c7aa81f90332f7077a
s390x
nodejs-22.22.2-1.el10_1.s390x.rpm SHA-256: fd236c8376346de3cf631967be517ad49ba268187e46cccfa1952ab37377512d
nodejs-debuginfo-22.22.2-1.el10_1.s390x.rpm SHA-256: 7c70d7f8fea1a4880df8949d489f9c17f7e534b95c40b04e42b3283e6bad295a
nodejs-devel-22.22.2-1.el10_1.s390x.rpm SHA-256: a6ff30e53d2b71d4fd932933d1173f03ca0a34340c3dd69c0750b09c9a17bc9f
nodejs-docs-22.22.2-1.el10_1.noarch.rpm SHA-256: c2de925b62b21d28b187533741f61a3ff3a92661908c0955bd4a64be55ad16d0
nodejs-full-i18n-22.22.2-1.el10_1.s390x.rpm SHA-256: 2b2d88c92eba29964a97cb6b2863a7e7c30994fe68ec3a5cf4e3de39b44a7c44
nodejs-libs-22.22.2-1.el10_1.s390x.rpm SHA-256: 48df308f2dabec4c554eca81a9b3a2436937f8662a36d6bc69ebfdcdfa7d76ee
nodejs-libs-debuginfo-22.22.2-1.el10_1.s390x.rpm SHA-256: 59f19a6247a281a4f1175f4a1b728d5847c2ba10ee228490a1f10f69af8b2606
nodejs-npm-10.9.7-1.22.22.2.1.el10_1.s390x.rpm SHA-256: adbcd4ad31792d18743f58c9364299fa39b4a62027f1e1e713ad70144697c722
nodejs22-debuginfo-22.22.2-1.el10_1.s390x.rpm SHA-256: a7ef372f4d6730ac89100c8dbc55e3d76e3bb51186525a659c2a138fd09af2bc
nodejs22-debugsource-22.22.2-1.el10_1.s390x.rpm SHA-256: 6a161dd39a75e5acb7ece80bf7f782a8c6b2a85d3c663cd0e8dc337493c47117

Red Hat Enterprise Linux for Power, little endian 10

SRPM
nodejs22-22.22.2-1.el10_1.src.rpm SHA-256: 0fbadd833d5465e9542457d43692d6b39803f44ccd7865c7aa81f90332f7077a
ppc64le
nodejs-22.22.2-1.el10_1.ppc64le.rpm SHA-256: a6f858eb4098575fb108a1f0502cabe9e7db5bd37ec0b76a328840505846ec70
nodejs-debuginfo-22.22.2-1.el10_1.ppc64le.rpm SHA-256: 201ce77e4883ec55c67b32b6a89932f231adf8824279f6c709b2171b24b80a6a
nodejs-devel-22.22.2-1.el10_1.ppc64le.rpm SHA-256: adc209befc824db8a6768bbd1f34c81249156bcb6b73594b10fb03a48fd31f32
nodejs-docs-22.22.2-1.el10_1.noarch.rpm SHA-256: c2de925b62b21d28b187533741f61a3ff3a92661908c0955bd4a64be55ad16d0
nodejs-full-i18n-22.22.2-1.el10_1.ppc64le.rpm SHA-256: 348ea8139ccfcf05b27a98c223efdacda8ab9cc80afd48f1a7a87ca2d9561d7c
nodejs-libs-22.22.2-1.el10_1.ppc64le.rpm SHA-256: 4be27ad6f873ed5fa7764becafd8fa1132accf8383ffa30026fe82cb1a0d7195
nodejs-libs-debuginfo-22.22.2-1.el10_1.ppc64le.rpm SHA-256: 943ab33cb3e57f4f559f5732fcd252841dca9fdd529cdbcc2c27a26ff9908710
nodejs-npm-10.9.7-1.22.22.2.1.el10_1.ppc64le.rpm SHA-256: aa21bf667ed7533e081fbf505c0219568e9edb392b39fb26f5e642df42d9e0b9
nodejs22-debuginfo-22.22.2-1.el10_1.ppc64le.rpm SHA-256: cde321636f08288bbe9e360041b9d824bfd807a8391339988147a9a110b0f137
nodejs22-debugsource-22.22.2-1.el10_1.ppc64le.rpm SHA-256: fcb1f818fcf48c3710e297cfd5f54a8c85f8182e69b0451c90cad40a892f681d

Red Hat Enterprise Linux for ARM 64 10

SRPM
nodejs22-22.22.2-1.el10_1.src.rpm SHA-256: 0fbadd833d5465e9542457d43692d6b39803f44ccd7865c7aa81f90332f7077a
aarch64
nodejs-22.22.2-1.el10_1.aarch64.rpm SHA-256: 7f57273275ead7e85ab8f71e5dadea245db595324c2e04e096abbdf6bf3efa8f
nodejs-debuginfo-22.22.2-1.el10_1.aarch64.rpm SHA-256: 6b57d9f2ab3c04346752d73b9098ab048013a121738162de11d192371e47efe7
nodejs-devel-22.22.2-1.el10_1.aarch64.rpm SHA-256: ab78ca51550cb121a1960c9e7f9aa37732ee81e1dbbee5d7c3de578b73a747ee
nodejs-docs-22.22.2-1.el10_1.noarch.rpm SHA-256: c2de925b62b21d28b187533741f61a3ff3a92661908c0955bd4a64be55ad16d0
nodejs-full-i18n-22.22.2-1.el10_1.aarch64.rpm SHA-256: 161854d01bfc937aae4fa5781310e6a81142f8e800419f426aafd6e5b55d0b1f
nodejs-libs-22.22.2-1.el10_1.aarch64.rpm SHA-256: bebcc516c55fe603abc57de8f76aef7c706aaef62c741098b297e41062f261f0
nodejs-libs-debuginfo-22.22.2-1.el10_1.aarch64.rpm SHA-256: 34c9b6141e3ac9efda5408a8fa10ce5558dc808e85b2520a1093f0c2026a22d0
nodejs-npm-10.9.7-1.22.22.2.1.el10_1.aarch64.rpm SHA-256: eba85c050d7effa0e2ec02433562b1d8788cb2a72c324355e2ad3d5161e0dad0
nodejs22-debuginfo-22.22.2-1.el10_1.aarch64.rpm SHA-256: e8f07823f662cd9c65a1a53f1e609a7538dfcc8985c56162cc0ec076915fc4c2
nodejs22-debugsource-22.22.2-1.el10_1.aarch64.rpm SHA-256: 53caaad6bab4789f93c3e9060d12c03b9bc45b20c5cd19bfda64a411188c82fb

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility