Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:7670

Опубликовано: 13 апр. 2026
Источник: rocky
Оценка: Important

Описание

Important: nodejs:24 security update

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • nodejs: Nodejs denial of service (CVE-2026-21637)

  • minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)

  • undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)

  • undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)

  • undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)

  • undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)

  • undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)

  • undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)

  • nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)

  • Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)

  • Node.js: Node.js: Denial of Service due to crafted HTTP __proto__ header (CVE-2026-21710)

  • Node.js: Node.js: Information disclosure due to fs.realpathSync.native() bypassing filesystem read restrictions (CVE-2026-21715)

  • nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)

  • Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)

  • Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)

  • Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)

  • nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
nodejs-nodemonnoarch1.module+el8.10.0+2084+ab509703nodejs-nodemon-3.0.3-1.module+el8.10.0+2084+ab509703.noarch.rpm
nodejs-packagingnoarch6.module+el8.10.0+40048+6d99f608nodejs-packaging-2021.06-6.module+el8.10.0+40048+6d99f608.noarch.rpm
nodejs-packaging-bundlernoarch6.module+el8.10.0+40048+6d99f608nodejs-packaging-bundler-2021.06-6.module+el8.10.0+40048+6d99f608.noarch.rpm
nodejsx86_642.module+el8.10.0+40152+064e9ddbnodejs-24.14.1-2.module+el8.10.0+40152+064e9ddb.x86_64.rpm
nodejs-develx86_642.module+el8.10.0+40152+064e9ddbnodejs-devel-24.14.1-2.module+el8.10.0+40152+064e9ddb.x86_64.rpm
nodejs-docsnoarch2.module+el8.10.0+40152+064e9ddbnodejs-docs-24.14.1-2.module+el8.10.0+40152+064e9ddb.noarch.rpm
nodejs-full-i18nx86_642.module+el8.10.0+40152+064e9ddbnodejs-full-i18n-24.14.1-2.module+el8.10.0+40152+064e9ddb.x86_64.rpm
nodejs-libsx86_642.module+el8.10.0+40152+064e9ddbnodejs-libs-24.14.1-2.module+el8.10.0+40152+064e9ddb.x86_64.rpm
npmnoarch1.24.14.1.2.module+el8.10.0+40152+064e9ddbnpm-11.11.0-1.24.14.1.2.module+el8.10.0+40152+064e9ddb.noarch.rpm
v8-13.6-develx86_641.24.14.1.2.module+el8.10.0+40152+064e9ddbv8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el8.10.0+40152+064e9ddb.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
24 дня назад

ELSA-2026-7670: nodejs:24 security update (IMPORTANT)

rocky
21 день назад

Important: nodejs24 security update

rocky
27 дней назад

Important: nodejs:24 security update

oracle-oval
24 дня назад

ELSA-2026-7675: nodejs24 security update (IMPORTANT)

oracle-oval
27 дней назад

ELSA-2026-7350: nodejs:24 security update (IMPORTANT)