First published: Mon Oct 09 2023(Updated: )
Important: nodejs security, bug fix, and enhancement update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debugsource | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debugsource | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-docs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-full-i18n | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/npm | <8.19.4-1.16.20.2.1.el9_0 | 8.19.4-1.16.20.2.1.el9_0 |
redhat/nodejs-full-i18n | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/npm | <8.19.4-1.16.20.2.1.el9_0 | 8.19.4-1.16.20.2.1.el9_0 |
redhat/nodejs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-debugsource | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-full-i18n | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/nodejs-libs-debuginfo | <16.20.2-1.el9_0 | 16.20.2-1.el9_0 |
redhat/npm | <8.19.4-1.16.20.2.1.el9_0 | 8.19.4-1.16.20.2.1.el9_0 |
redhat/nodejs | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-debuginfo | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-debugsource | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-full-i18n | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-libs | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/nodejs-libs-debuginfo | <16.20.2-1.el9_0.aa | 16.20.2-1.el9_0.aa |
redhat/npm | <8.19.4-1.16.20.2.1.el9_0.aa | 8.19.4-1.16.20.2.1.el9_0.aa |
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security update is RHSA-2023:5533.
The severity rating of the vulnerability is high.
There is no CVE ID associated with this vulnerability.
You can find more information about this vulnerability on the Red Hat website.
You can fix this vulnerability by applying the security update provided by Red Hat.