Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
RHSA-2023:5361
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2023:5361
Import Source
https://security.access.redhat.com/data/osv/RHSA-2023:5361.json
JSON Data
https://api.test.osv.dev/v1/vulns/RHSA-2023:5361
Upstream
CVE-2022-25883
CVE-2023-30581
CVE-2023-30588
CVE-2023-30589
CVE-2023-30590
CVE-2023-32002
CVE-2023-32006
CVE-2023-32559
Published
2024-10-22T00:40:40Z
Modified
2025-09-13T10:03:39Z
Severity
8.1 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
Details
References
https://access.redhat.com/errata/RHSA-2023:5361
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2216475
https://bugzilla.redhat.com/show_bug.cgi?id=2219824
https://bugzilla.redhat.com/show_bug.cgi?id=2219838
https://bugzilla.redhat.com/show_bug.cgi?id=2219841
https://bugzilla.redhat.com/show_bug.cgi?id=2219842
https://bugzilla.redhat.com/show_bug.cgi?id=2223679
https://bugzilla.redhat.com/show_bug.cgi?id=2230948
https://bugzilla.redhat.com/show_bug.cgi?id=2230955
https://bugzilla.redhat.com/show_bug.cgi?id=2230956
https://bugzilla.redhat.com/show_bug.cgi?id=2233892
https://bugzilla.redhat.com/show_bug.cgi?id=2237395
https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5361.json
https://access.redhat.com/security/cve/CVE-2022-25883
https://www.cve.org/CVERecord?id=CVE-2022-25883
https://nvd.nist.gov/vuln/detail/CVE-2022-25883
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
https://access.redhat.com/security/cve/CVE-2023-30581
https://www.cve.org/CVERecord?id=CVE-2023-30581
https://nvd.nist.gov/vuln/detail/CVE-2023-30581
https://access.redhat.com/security/cve/CVE-2023-30588
https://www.cve.org/CVERecord?id=CVE-2023-30588
https://nvd.nist.gov/vuln/detail/CVE-2023-30588
https://access.redhat.com/security/cve/CVE-2023-30589
https://www.cve.org/CVERecord?id=CVE-2023-30589
https://nvd.nist.gov/vuln/detail/CVE-2023-30589
https://access.redhat.com/security/cve/CVE-2023-30590
https://www.cve.org/CVERecord?id=CVE-2023-30590
https://nvd.nist.gov/vuln/detail/CVE-2023-30590
https://access.redhat.com/security/cve/CVE-2023-32002
https://www.cve.org/CVERecord?id=CVE-2023-32002
https://nvd.nist.gov/vuln/detail/CVE-2023-32002
https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002
https://access.redhat.com/security/cve/CVE-2023-32006
https://www.cve.org/CVERecord?id=CVE-2023-32006
https://nvd.nist.gov/vuln/detail/CVE-2023-32006
https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006
https://access.redhat.com/security/cve/CVE-2023-32559
https://www.cve.org/CVERecord?id=CVE-2023-32559
https://nvd.nist.gov/vuln/detail/CVE-2023-32559
https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559
Affected packages
Red Hat:rhel_eus:8.6::appstream
/
nodejs-16.20.2
Package
Name
nodejs-16.20.2
Purl
pkg:rpm/redhat/nodejs
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2.module+el8.6.0+19897+9590a839.x86_64
Red Hat:rhel_eus:8.6::appstream
/
nodejs-debuginfo-16.20.2
Package
Name
nodejs-debuginfo-16.20.2
Purl
pkg:rpm/redhat/nodejs-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2.module+el8.6.0+19897+9590a839.x86_64
Red Hat:rhel_eus:8.6::appstream
/
nodejs-debugsource-16.20.2
Package
Name
nodejs-debugsource-16.20.2
Purl
pkg:rpm/redhat/nodejs-debugsource
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2.module+el8.6.0+19897+9590a839.x86_64
Red Hat:rhel_eus:8.6::appstream
/
nodejs-devel-16.20.2
Package
Name
nodejs-devel-16.20.2
Purl
pkg:rpm/redhat/nodejs-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2.module+el8.6.0+19897+9590a839.x86_64
Red Hat:rhel_eus:8.6::appstream
/
nodejs-docs-16.20.2
Package
Name
nodejs-docs-16.20.2
Purl
pkg:rpm/redhat/nodejs-docs
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2.module+el8.6.0+19897+9590a839.noarch
Red Hat:rhel_eus:8.6::appstream
/
nodejs-full-i18n-16.20.2
Package
Name
nodejs-full-i18n-16.20.2
Purl
pkg:rpm/redhat/nodejs-full-i18n
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2.module+el8.6.0+19897+9590a839.x86_64
Red Hat:rhel_eus:8.6::appstream
/
nodejs-nodemon-3.0.1
Package
Name
nodejs-nodemon-3.0.1
Purl
pkg:rpm/redhat/nodejs-nodemon
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.module+el8.6.0+19765+366b9144.src
Red Hat:rhel_eus:8.6::appstream
/
nodejs-packaging-26
Package
Name
nodejs-packaging-26
Purl
pkg:rpm/redhat/nodejs-packaging
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.module+el8.6.0+19856+c0c87259.src
Red Hat:rhel_eus:8.6::appstream
/
npm-8.19.4
Package
Name
npm-8.19.4
Purl
pkg:rpm/redhat/npm
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64
RHSA-2023:5361 - OSV