Bug 2431349 (CVE-2025-59465) - CVE-2025-59465 nodejs: Nodejs denial of service
Summary: CVE-2025-59465 nodejs: Nodejs denial of service
Keywords:
Status: NEW
Alias: CVE-2025-59465
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2431480 2431482 2431484 2431487 2431490 2431493 2431496
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-20 21:03 UTC by OSIDB Bzimport
Modified: 2026-02-18 08:36 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2026:2447 0 None None None 2026-02-10 14:22:54 UTC
Red Hat Product Errata RHBA-2026:2815 0 None None None 2026-02-17 11:23:57 UTC
Red Hat Product Errata RHSA-2026:1842 0 None None None 2026-02-05 15:58:38 UTC
Red Hat Product Errata RHSA-2026:1843 0 None None None 2026-02-05 15:58:29 UTC
Red Hat Product Errata RHSA-2026:2420 0 None None None 2026-02-10 12:45:31 UTC
Red Hat Product Errata RHSA-2026:2421 0 None None None 2026-02-10 12:45:11 UTC
Red Hat Product Errata RHSA-2026:2422 0 None None None 2026-02-10 12:44:52 UTC
Red Hat Product Errata RHSA-2026:2767 0 None None None 2026-02-17 00:39:44 UTC
Red Hat Product Errata RHSA-2026:2768 0 None None None 2026-02-17 00:58:32 UTC
Red Hat Product Errata RHSA-2026:2781 0 None None None 2026-02-17 09:25:18 UTC
Red Hat Product Errata RHSA-2026:2782 0 None None None 2026-02-17 09:25:39 UTC
Red Hat Product Errata RHSA-2026:2783 0 None None None 2026-02-17 09:25:38 UTC
Red Hat Product Errata RHSA-2026:2864 0 None None None 2026-02-18 02:24:25 UTC
Red Hat Product Errata RHSA-2026:2899 0 None None None 2026-02-18 08:36:58 UTC

Description OSIDB Bzimport 2026-01-20 21:03:02 UTC
A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:
```
server.on('secureConnection', socket => {
  socket.on('error', err => {
    console.log(err)
  })
})
```

Comment 2 errata-xmlrpc 2026-02-05 15:58:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:1843 https://access.redhat.com/errata/RHSA-2026:1843

Comment 3 errata-xmlrpc 2026-02-05 15:58:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:1842 https://access.redhat.com/errata/RHSA-2026:1842

Comment 4 errata-xmlrpc 2026-02-10 12:44:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:2422 https://access.redhat.com/errata/RHSA-2026:2422

Comment 5 errata-xmlrpc 2026-02-10 12:45:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:2421 https://access.redhat.com/errata/RHSA-2026:2421

Comment 6 errata-xmlrpc 2026-02-10 12:45:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:2420 https://access.redhat.com/errata/RHSA-2026:2420

Comment 7 errata-xmlrpc 2026-02-17 00:39:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:2767 https://access.redhat.com/errata/RHSA-2026:2767

Comment 8 errata-xmlrpc 2026-02-17 00:58:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:2768 https://access.redhat.com/errata/RHSA-2026:2768

Comment 9 errata-xmlrpc 2026-02-17 09:25:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2781 https://access.redhat.com/errata/RHSA-2026:2781

Comment 10 errata-xmlrpc 2026-02-17 09:25:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2783 https://access.redhat.com/errata/RHSA-2026:2783

Comment 11 errata-xmlrpc 2026-02-17 09:25:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2782 https://access.redhat.com/errata/RHSA-2026:2782

Comment 12 errata-xmlrpc 2026-02-18 02:24:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:2864 https://access.redhat.com/errata/RHSA-2026:2864

Comment 13 errata-xmlrpc 2026-02-18 08:36:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:2899 https://access.redhat.com/errata/RHSA-2026:2899


Note You need to log in before you can comment on or make changes to this bug.