First published: Wed Oct 18 2023(Updated: )
Important: rh-nodejs14 security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat Software Collections (for RHEL Workstation) | ||
Red Hat Red Hat Software Collections (for RHEL Server for IBM Power LE) | ||
Red Hat Red Hat Software Collections (for RHEL Server for System Z) | ||
Red Hat Red Hat Software Collections (for RHEL Server) | ||
redhat/rh-nodejs14-nodejs | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-debuginfo | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-devel | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-docs | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-full-i18n | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-npm | <6.14.18-14.21.3.5.el7 | 6.14.18-14.21.3.5.el7 |
redhat/rh-nodejs14-nodejs-debuginfo | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-devel | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-full-i18n | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-npm | <6.14.18-14.21.3.5.el7 | 6.14.18-14.21.3.5.el7 |
redhat/rh-nodejs14-nodejs | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-debuginfo | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-devel | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-nodejs-full-i18n | <14.21.3-5.el7 | 14.21.3-5.el7 |
redhat/rh-nodejs14-npm | <6.14.18-14.21.3.5.el7 | 6.14.18-14.21.3.5.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:5840 is high (7).
The affected software version of RHSA-2023:5840 is rh-nodejs14-nodejs version 14.21.3-5.el7.
To fix RHSA-2023:5840, update to version 14.21.3-5.el7 of rh-nodejs14-nodejs.
Yes, you can find references related to RHSA-2023:5840 [here](https://bugzilla.redhat.com/show_bug.cgi?id=2242803) and [here](https://access.redhat.com/security/updates/classification/#important).