JustAppSec
Back to news

Red Hat ships Important Node.js 20 security update for RHEL 9.4

1 min readPublished 17 Feb 2026Updated 17 Feb 2026Source: Red Hat Product Errata

TL;DR — Red Hat shipped an Important-severity advisory updating Node.js 20 on RHEL 9.4 EUS, addressing denial of service, memory exposure, and file permission bypass issues.

What happened

Red Hat published RHSA-2026:2768 (severity: Important) for the nodejs:20 module on RHEL 9.4 Extended Update Support. The advisory addresses three security issues: denial of service (CVE-2025-59465), uninitialized memory exposure (CVE-2025-55131), and a file permissions bypass (CVE-2025-55130).

Distribution-level Node.js patches often lag behind upstream releases — if you're running Node.js from RHEL module streams rather than upstream binaries, this is your signal to patch.

Who is impacted

  • Platform teams running RHEL 9.4 EUS with the nodejs:20 runtime for applications or build pipelines.
  • Developers building services that rely on the distribution-provided Node.js 20 module stream.

What to do now

  • Prioritize patching systems using nodejs:20 on RHEL 9.4 EUS.
  • Apply the Red Hat update as described in the advisory.
  • Restart Node.js services and build agents/CI runners to ensure the patched runtime is loaded.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.