vulnerability

Amazon Linux 2023: CVE-2025-59466: Important priority package update for nodejs20 (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Jan 20, 2026
Added
Feb 10, 2026
Modified
Feb 10, 2026

Description

We have identified a bug in Node.js error handling where "Maximum call stack size exceeded" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on('uncaughtException')`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.

Solutions

amazon-linux-2023-upgrade-nodejs20amazon-linux-2023-upgrade-nodejs20-debuginfoamazon-linux-2023-upgrade-nodejs20-debugsourceamazon-linux-2023-upgrade-nodejs20-develamazon-linux-2023-upgrade-nodejs20-docsamazon-linux-2023-upgrade-nodejs20-full-i18namazon-linux-2023-upgrade-nodejs20-libsamazon-linux-2023-upgrade-nodejs20-libs-debuginfoamazon-linux-2023-upgrade-nodejs20-npmamazon-linux-2023-upgrade-nodejs22amazon-linux-2023-upgrade-nodejs22-debuginfoamazon-linux-2023-upgrade-nodejs22-debugsourceamazon-linux-2023-upgrade-nodejs22-develamazon-linux-2023-upgrade-nodejs22-docsamazon-linux-2023-upgrade-nodejs22-full-i18namazon-linux-2023-upgrade-nodejs22-libsamazon-linux-2023-upgrade-nodejs22-libs-debuginfoamazon-linux-2023-upgrade-nodejs22-npmamazon-linux-2023-upgrade-nodejs24amazon-linux-2023-upgrade-nodejs24-debuginfoamazon-linux-2023-upgrade-nodejs24-debugsourceamazon-linux-2023-upgrade-nodejs24-develamazon-linux-2023-upgrade-nodejs24-docsamazon-linux-2023-upgrade-nodejs24-full-i18namazon-linux-2023-upgrade-nodejs24-libsamazon-linux-2023-upgrade-nodejs24-libs-debuginfoamazon-linux-2023-upgrade-nodejs24-npmamazon-linux-2023-upgrade-v8-11-3-develamazon-linux-2023-upgrade-v8-12-4-develamazon-linux-2023-upgrade-v8-13-6-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.