First published: Mon Oct 09 2023(Updated: )
Important: nodejs security, bug fix, and enhancement update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat Enterprise Linux for ARM 64 - Extended Update Support | ||
Red Hat Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates | ||
Red Hat Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | ||
Red Hat Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | ||
Red Hat Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates | ||
redhat/nodejs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debugsource | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debugsource | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-docs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-full-i18n | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/npm | <8.19.4-1.16.20.2.1.el9_0 | 8.19.4-1.16.20.2.1.el9_0 |
redhat/nodejs-full-i18n | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/npm | <8.19.4-1.16.20.2.1.el9_0 | 8.19.4-1.16.20.2.1.el9_0 |
redhat/nodejs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debugsource | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-full-i18n | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/npm | <8.19.4-1.16.20.2.1.el9_0 | 8.19.4-1.16.20.2.1.el9_0 |
redhat/nodejs | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-debuginfo | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-debugsource | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-full-i18n | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-libs | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-libs-debuginfo | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/npm | <8.19.4-1.16.20.2.1.el9_0.aa | 8.19.4-1.16.20.2.1.el9_0.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security update is RHSA-2023:5533.
The severity rating of the vulnerability is high.
There is no CVE ID associated with this vulnerability.
You can find more information about this vulnerability on the Red Hat website.
You can fix this vulnerability by applying the security update provided by Red Hat.