{"id":"RLSA-2026:7080","summary":"Important: nodejs22 security update","details":"Node.js is a platform built on Chrome's JavaScript runtime \\ for easily building fast, scalable network applications. \\ Node.js uses an event-driven, non-blocking I/O model that \\ makes it lightweight and efficient, perfect for data-intensive \\ real-time applications that run across distributed devices.\n\nSecurity Fix(es):\n\n* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)\n\n* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)\n\n* minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)\n\n* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)\n\n* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)\n\n* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)\n\n* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)\n\n* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)\n\n* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-04-12T06:30:09.304122Z","published":"2026-04-12T06:07:10.449425Z","upstream":["CVE-2026-1525","CVE-2026-1526","CVE-2026-1528","CVE-2026-21710","CVE-2026-2229","CVE-2026-25547","CVE-2026-26996","CVE-2026-27135","CVE-2026-27904"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2026:7080"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447142"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442922"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447144"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2441268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448754"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447143"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2436942"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2447145"}],"affected":[{"package":{"name":"nodejs22","ecosystem":"Rocky Linux:10","purl":"pkg:rpm/rocky-linux/nodejs22?distro=rocky-linux-10&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:22.22.2-1.el10_1"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2026:7080.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}