Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:7310 - Security Advisory
Issued:
2026-04-09
Updated:
2026-04-09

RHSA-2026:7310 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nodejs22 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for nodejs22 is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.

Security Fix(es):

  • minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
  • minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)
  • undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
  • undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
  • undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
  • undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
  • nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
  • Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x
  • Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64

Fixes

  • BZ - 2441268 - CVE-2026-26996 minimatch: minimatch: Denial of Service via specially crafted glob patterns
  • BZ - 2442922 - CVE-2026-27904 minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
  • BZ - 2447142 - CVE-2026-1526 undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression
  • BZ - 2447143 - CVE-2026-2229 undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter
  • BZ - 2447144 - CVE-2026-1525 undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers
  • BZ - 2447145 - CVE-2026-1528 undici: undici: Denial of Service via crafted WebSocket frame with large length
  • BZ - 2448754 - CVE-2026-27135 nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination
  • BZ - 2453151 - CVE-2026-21710 Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header

CVEs

  • CVE-2026-1525
  • CVE-2026-1526
  • CVE-2026-1528
  • CVE-2026-2229
  • CVE-2026-21710
  • CVE-2026-25547
  • CVE-2026-26996
  • CVE-2026-27135
  • CVE-2026-27904

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0

SRPM
nodejs22-22.22.2-2.el10_0.src.rpm SHA-256: b9f13237e044d7205887b2ab9e5f8af7c9d72beaf5cfd27f646429359d80114f
x86_64
nodejs-22.22.2-2.el10_0.x86_64.rpm SHA-256: e48647600db8a6457f81364a1bc62d201873b75132d23b4887334cdc50c705a6
nodejs-debuginfo-22.22.2-2.el10_0.x86_64.rpm SHA-256: 573337c8c392edaeb2ff56ac02fb4f178d85988d13d77639156e307c6efaf17d
nodejs-devel-22.22.2-2.el10_0.x86_64.rpm SHA-256: 4dbbfd62dfe65ce27ed28e2e0ef7c50f978c7f88baa3bd80ef5bfc6a6ef36acd
nodejs-docs-22.22.2-2.el10_0.noarch.rpm SHA-256: f0f5bdb418b3eb7bc970807a795b2ae066c1954c34b0d2670d1d940b3f7467bd
nodejs-full-i18n-22.22.2-2.el10_0.x86_64.rpm SHA-256: 55763836d8435a2388fd768db17650e41645166589123fe24b95fd0888a72135
nodejs-libs-22.22.2-2.el10_0.x86_64.rpm SHA-256: f7f4a1454417204e8a808fc53dd7839abb79f234b3b8e591ebd1b7872a2215b6
nodejs-libs-debuginfo-22.22.2-2.el10_0.x86_64.rpm SHA-256: 3521a52f8f106de39390e8f689dbeaf475a3042d2013ec2a42c8a26b9f8e5a80
nodejs-npm-10.9.7-1.22.22.2.2.el10_0.x86_64.rpm SHA-256: 6a8cb779538fa08ed7243feb38681482ea6242d67c283634f0256ed112ec03ba
nodejs22-debuginfo-22.22.2-2.el10_0.x86_64.rpm SHA-256: 681c4c5d4539647bbcd6b3a7e1bdbc12b7a78bbb124eb499483e16ea07f17bb2
nodejs22-debugsource-22.22.2-2.el10_0.x86_64.rpm SHA-256: 009a7a0ebc2b59345688d5ea8e7ae1fefaa614dd5cf06de64f2da2b9d515c445

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0

SRPM
nodejs22-22.22.2-2.el10_0.src.rpm SHA-256: b9f13237e044d7205887b2ab9e5f8af7c9d72beaf5cfd27f646429359d80114f
s390x
nodejs-22.22.2-2.el10_0.s390x.rpm SHA-256: 900cc1b5fd19aa3a8eec95c33d46587aa38924e1505ff815b8cec3aa16ba2586
nodejs-debuginfo-22.22.2-2.el10_0.s390x.rpm SHA-256: f7e6698b4a5dc148c0c55c6d03b7576b122fcde908f0bb87932b8f6cb8d9aaeb
nodejs-devel-22.22.2-2.el10_0.s390x.rpm SHA-256: ac81079ef609d8003dd47f9da80f293727c687f0cf7d92b651f78d9f8dc9b9d5
nodejs-docs-22.22.2-2.el10_0.noarch.rpm SHA-256: f0f5bdb418b3eb7bc970807a795b2ae066c1954c34b0d2670d1d940b3f7467bd
nodejs-full-i18n-22.22.2-2.el10_0.s390x.rpm SHA-256: eee208e344cad1dac3789b95be4e5ca096c7bc2b7502b1793f2c4ce534fd06c9
nodejs-libs-22.22.2-2.el10_0.s390x.rpm SHA-256: 79c1637c2167c397552ad9429ee8f0a86838a0df60ac11d2aee95163dc208f41
nodejs-libs-debuginfo-22.22.2-2.el10_0.s390x.rpm SHA-256: abf8f2cf559d93207a584cfeb6a2b1a6679c1febcb4dd9118c1485f2b2eb89c2
nodejs-npm-10.9.7-1.22.22.2.2.el10_0.s390x.rpm SHA-256: db0f236f9b228127e5488e2748fed498af933321fb561a623c5d0e9285ad88ad
nodejs22-debuginfo-22.22.2-2.el10_0.s390x.rpm SHA-256: f6238c6fb2c854a3228304eb4099c0bfdc4edeeea3686cd47e7ee1ebb0e89855
nodejs22-debugsource-22.22.2-2.el10_0.s390x.rpm SHA-256: 5db905bc1b687d49a45b47a26a3ea52796599f8f09582c0904ada125fcc6ef27

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0

SRPM
nodejs22-22.22.2-2.el10_0.src.rpm SHA-256: b9f13237e044d7205887b2ab9e5f8af7c9d72beaf5cfd27f646429359d80114f
ppc64le
nodejs-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 7c8936fe6bd23c2c1d981e515179e8a688d6bf79ae809543c9a310d9564f40bc
nodejs-debuginfo-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 4b1849fbea7b64b0d2cdc5f15f80d8d783e6da60a443f747b6a9fbcec2ae650a
nodejs-devel-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 996ee9d74c3ccf127990c9b7159f1e299afa97aaf39afbba1c06d6a1325cffa1
nodejs-docs-22.22.2-2.el10_0.noarch.rpm SHA-256: f0f5bdb418b3eb7bc970807a795b2ae066c1954c34b0d2670d1d940b3f7467bd
nodejs-full-i18n-22.22.2-2.el10_0.ppc64le.rpm SHA-256: a28aa6076591588b4151a885a12af5a2d03f7a01d888dbb07b5983cc36ef394a
nodejs-libs-22.22.2-2.el10_0.ppc64le.rpm SHA-256: c6ef91469ade7b33e08f8990675e183898b42f4b79e1b5393fdbc4ff8bc2e9a0
nodejs-libs-debuginfo-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 38cbd18cc9eec338a5835ad319eeeda44fdd2d1d48800cf1d9d4d40ef3042df5
nodejs-npm-10.9.7-1.22.22.2.2.el10_0.ppc64le.rpm SHA-256: 53b72d908d32e708b62f0edffd47c5add28799646b146ace0c5ce346b634447d
nodejs22-debuginfo-22.22.2-2.el10_0.ppc64le.rpm SHA-256: c5b7b0cf0df655d698474c52c6a13485827be078df62772664b2b0a0ac681ae4
nodejs22-debugsource-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 587e7cdf2156800a21ec690204346edadf15a1bd4ff8013aa9d91e8314b4a288

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0

SRPM
nodejs22-22.22.2-2.el10_0.src.rpm SHA-256: b9f13237e044d7205887b2ab9e5f8af7c9d72beaf5cfd27f646429359d80114f
aarch64
nodejs-22.22.2-2.el10_0.aarch64.rpm SHA-256: 98ce7555847db282ecb6c1355874fd55678a3cf969bec7430b12ee56154a8818
nodejs-debuginfo-22.22.2-2.el10_0.aarch64.rpm SHA-256: 827a3bfda63606dc92bf5ecb3690ba73b1c579e3cdd734fc9010c6f77a362ffb
nodejs-devel-22.22.2-2.el10_0.aarch64.rpm SHA-256: 0d5459c2ae5ae6d7d4c7723c8831e948e5646f6d871b197c549aae71169586bf
nodejs-docs-22.22.2-2.el10_0.noarch.rpm SHA-256: f0f5bdb418b3eb7bc970807a795b2ae066c1954c34b0d2670d1d940b3f7467bd
nodejs-full-i18n-22.22.2-2.el10_0.aarch64.rpm SHA-256: 99c94542430dea22c0e9641d8180e877c08c0daec20aa35ed3718d33eee3e10f
nodejs-libs-22.22.2-2.el10_0.aarch64.rpm SHA-256: 0b5db3dacef4f753b797275bd8cf10fc3abc9560b8ad3c48d26e5d1287d20588
nodejs-libs-debuginfo-22.22.2-2.el10_0.aarch64.rpm SHA-256: 5d99ce6af7dfd5d4ca9c720b5d32c5db9af75d6e2400f5c2912e0679c62241cd
nodejs-npm-10.9.7-1.22.22.2.2.el10_0.aarch64.rpm SHA-256: dbd3f230f75cb45b7f292b56c9396e00c8d3ff4dc1e9cfd65e4c5d52c9db29f0
nodejs22-debuginfo-22.22.2-2.el10_0.aarch64.rpm SHA-256: 8214ae1ecbbfcab8db3ca7fce1e79a21e411c43ed78e3509bee64a16adb97d00
nodejs22-debugsource-22.22.2-2.el10_0.aarch64.rpm SHA-256: 89709d1a952d25f8ec6547d03a8a26a3fd02a410000bfe2cfaf8287d84cc3121

Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0

SRPM
nodejs22-22.22.2-2.el10_0.src.rpm SHA-256: b9f13237e044d7205887b2ab9e5f8af7c9d72beaf5cfd27f646429359d80114f
aarch64
nodejs-22.22.2-2.el10_0.aarch64.rpm SHA-256: 98ce7555847db282ecb6c1355874fd55678a3cf969bec7430b12ee56154a8818
nodejs-debuginfo-22.22.2-2.el10_0.aarch64.rpm SHA-256: 827a3bfda63606dc92bf5ecb3690ba73b1c579e3cdd734fc9010c6f77a362ffb
nodejs-devel-22.22.2-2.el10_0.aarch64.rpm SHA-256: 0d5459c2ae5ae6d7d4c7723c8831e948e5646f6d871b197c549aae71169586bf
nodejs-docs-22.22.2-2.el10_0.noarch.rpm SHA-256: f0f5bdb418b3eb7bc970807a795b2ae066c1954c34b0d2670d1d940b3f7467bd
nodejs-full-i18n-22.22.2-2.el10_0.aarch64.rpm SHA-256: 99c94542430dea22c0e9641d8180e877c08c0daec20aa35ed3718d33eee3e10f
nodejs-libs-22.22.2-2.el10_0.aarch64.rpm SHA-256: 0b5db3dacef4f753b797275bd8cf10fc3abc9560b8ad3c48d26e5d1287d20588
nodejs-libs-debuginfo-22.22.2-2.el10_0.aarch64.rpm SHA-256: 5d99ce6af7dfd5d4ca9c720b5d32c5db9af75d6e2400f5c2912e0679c62241cd
nodejs-npm-10.9.7-1.22.22.2.2.el10_0.aarch64.rpm SHA-256: dbd3f230f75cb45b7f292b56c9396e00c8d3ff4dc1e9cfd65e4c5d52c9db29f0
nodejs22-debuginfo-22.22.2-2.el10_0.aarch64.rpm SHA-256: 8214ae1ecbbfcab8db3ca7fce1e79a21e411c43ed78e3509bee64a16adb97d00
nodejs22-debugsource-22.22.2-2.el10_0.aarch64.rpm SHA-256: 89709d1a952d25f8ec6547d03a8a26a3fd02a410000bfe2cfaf8287d84cc3121

Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0

SRPM
nodejs22-22.22.2-2.el10_0.src.rpm SHA-256: b9f13237e044d7205887b2ab9e5f8af7c9d72beaf5cfd27f646429359d80114f
s390x
nodejs-22.22.2-2.el10_0.s390x.rpm SHA-256: 900cc1b5fd19aa3a8eec95c33d46587aa38924e1505ff815b8cec3aa16ba2586
nodejs-debuginfo-22.22.2-2.el10_0.s390x.rpm SHA-256: f7e6698b4a5dc148c0c55c6d03b7576b122fcde908f0bb87932b8f6cb8d9aaeb
nodejs-devel-22.22.2-2.el10_0.s390x.rpm SHA-256: ac81079ef609d8003dd47f9da80f293727c687f0cf7d92b651f78d9f8dc9b9d5
nodejs-docs-22.22.2-2.el10_0.noarch.rpm SHA-256: f0f5bdb418b3eb7bc970807a795b2ae066c1954c34b0d2670d1d940b3f7467bd
nodejs-full-i18n-22.22.2-2.el10_0.s390x.rpm SHA-256: eee208e344cad1dac3789b95be4e5ca096c7bc2b7502b1793f2c4ce534fd06c9
nodejs-libs-22.22.2-2.el10_0.s390x.rpm SHA-256: 79c1637c2167c397552ad9429ee8f0a86838a0df60ac11d2aee95163dc208f41
nodejs-libs-debuginfo-22.22.2-2.el10_0.s390x.rpm SHA-256: abf8f2cf559d93207a584cfeb6a2b1a6679c1febcb4dd9118c1485f2b2eb89c2
nodejs-npm-10.9.7-1.22.22.2.2.el10_0.s390x.rpm SHA-256: db0f236f9b228127e5488e2748fed498af933321fb561a623c5d0e9285ad88ad
nodejs22-debuginfo-22.22.2-2.el10_0.s390x.rpm SHA-256: f6238c6fb2c854a3228304eb4099c0bfdc4edeeea3686cd47e7ee1ebb0e89855
nodejs22-debugsource-22.22.2-2.el10_0.s390x.rpm SHA-256: 5db905bc1b687d49a45b47a26a3ea52796599f8f09582c0904ada125fcc6ef27

Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0

SRPM
nodejs22-22.22.2-2.el10_0.src.rpm SHA-256: b9f13237e044d7205887b2ab9e5f8af7c9d72beaf5cfd27f646429359d80114f
ppc64le
nodejs-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 7c8936fe6bd23c2c1d981e515179e8a688d6bf79ae809543c9a310d9564f40bc
nodejs-debuginfo-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 4b1849fbea7b64b0d2cdc5f15f80d8d783e6da60a443f747b6a9fbcec2ae650a
nodejs-devel-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 996ee9d74c3ccf127990c9b7159f1e299afa97aaf39afbba1c06d6a1325cffa1
nodejs-docs-22.22.2-2.el10_0.noarch.rpm SHA-256: f0f5bdb418b3eb7bc970807a795b2ae066c1954c34b0d2670d1d940b3f7467bd
nodejs-full-i18n-22.22.2-2.el10_0.ppc64le.rpm SHA-256: a28aa6076591588b4151a885a12af5a2d03f7a01d888dbb07b5983cc36ef394a
nodejs-libs-22.22.2-2.el10_0.ppc64le.rpm SHA-256: c6ef91469ade7b33e08f8990675e183898b42f4b79e1b5393fdbc4ff8bc2e9a0
nodejs-libs-debuginfo-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 38cbd18cc9eec338a5835ad319eeeda44fdd2d1d48800cf1d9d4d40ef3042df5
nodejs-npm-10.9.7-1.22.22.2.2.el10_0.ppc64le.rpm SHA-256: 53b72d908d32e708b62f0edffd47c5add28799646b146ace0c5ce346b634447d
nodejs22-debuginfo-22.22.2-2.el10_0.ppc64le.rpm SHA-256: c5b7b0cf0df655d698474c52c6a13485827be078df62772664b2b0a0ac681ae4
nodejs22-debugsource-22.22.2-2.el10_0.ppc64le.rpm SHA-256: 587e7cdf2156800a21ec690204346edadf15a1bd4ff8013aa9d91e8314b4a288

Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0

SRPM
nodejs22-22.22.2-2.el10_0.src.rpm SHA-256: b9f13237e044d7205887b2ab9e5f8af7c9d72beaf5cfd27f646429359d80114f
x86_64
nodejs-22.22.2-2.el10_0.x86_64.rpm SHA-256: e48647600db8a6457f81364a1bc62d201873b75132d23b4887334cdc50c705a6
nodejs-debuginfo-22.22.2-2.el10_0.x86_64.rpm SHA-256: 573337c8c392edaeb2ff56ac02fb4f178d85988d13d77639156e307c6efaf17d
nodejs-devel-22.22.2-2.el10_0.x86_64.rpm SHA-256: 4dbbfd62dfe65ce27ed28e2e0ef7c50f978c7f88baa3bd80ef5bfc6a6ef36acd
nodejs-docs-22.22.2-2.el10_0.noarch.rpm SHA-256: f0f5bdb418b3eb7bc970807a795b2ae066c1954c34b0d2670d1d940b3f7467bd
nodejs-full-i18n-22.22.2-2.el10_0.x86_64.rpm SHA-256: 55763836d8435a2388fd768db17650e41645166589123fe24b95fd0888a72135
nodejs-libs-22.22.2-2.el10_0.x86_64.rpm SHA-256: f7f4a1454417204e8a808fc53dd7839abb79f234b3b8e591ebd1b7872a2215b6
nodejs-libs-debuginfo-22.22.2-2.el10_0.x86_64.rpm SHA-256: 3521a52f8f106de39390e8f689dbeaf475a3042d2013ec2a42c8a26b9f8e5a80
nodejs-npm-10.9.7-1.22.22.2.2.el10_0.x86_64.rpm SHA-256: 6a8cb779538fa08ed7243feb38681482ea6242d67c283634f0256ed112ec03ba
nodejs22-debuginfo-22.22.2-2.el10_0.x86_64.rpm SHA-256: 681c4c5d4539647bbcd6b3a7e1bdbc12b7a78bbb124eb499483e16ea07f17bb2
nodejs22-debugsource-22.22.2-2.el10_0.x86_64.rpm SHA-256: 009a7a0ebc2b59345688d5ea8e7ae1fefaa614dd5cf06de64f2da2b9d515c445

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility