{"id":"RHSA-2023:5533","summary":"Red Hat Security Advisory: nodejs security, bug fix, and enhancement update","modified":"2026-03-19T10:06:45Z","published":"2024-09-29T23:58:35Z","upstream":["CVE-2022-25881","CVE-2022-4904","CVE-2023-23920","CVE-2023-23936","CVE-2023-24807","CVE-2023-30581","CVE-2023-30588","CVE-2023-30589","CVE-2023-30590","CVE-2023-32002","CVE-2023-32006","CVE-2023-32559"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:5533"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165824"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168631"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2172190"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2172204"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2172217"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178078"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219824"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219838"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219841"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219842"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223335"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230948"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230955"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230956"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236435"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5533.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4904"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4904"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4904"},{"type":"ARTICLE","url":"https://github.com/c-ares/c-ares/issues/496"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25881"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25881"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-23920"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-23920"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23920"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-23936"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-23936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23936"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24807"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24807"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24807"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-30581"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-30581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30581"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-30588"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-30588"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30588"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-30589"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-30589"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30589"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-30590"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-30590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30590"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32002"},{"type":"ARTICLE","url":"https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32006"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32006"},{"type":"ARTICLE","url":"https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32559"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32559"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32559"},{"type":"ARTICLE","url":"https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559"}],"affected":[{"package":{"name":"nodejs","ecosystem":"Red Hat:rhel_eus:9.0::appstream","purl":"pkg:rpm/redhat/nodejs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:16.20.2-1.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:5533.json"}},{"package":{"name":"nodejs-debuginfo","ecosystem":"Red Hat:rhel_eus:9.0::appstream","purl":"pkg:rpm/redhat/nodejs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:16.20.2-1.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:5533.json"}},{"package":{"name":"nodejs-debugsource","ecosystem":"Red Hat:rhel_eus:9.0::appstream","purl":"pkg:rpm/redhat/nodejs-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:16.20.2-1.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:5533.json"}},{"package":{"name":"nodejs-docs","ecosystem":"Red Hat:rhel_eus:9.0::appstream","purl":"pkg:rpm/redhat/nodejs-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:16.20.2-1.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:5533.json"}},{"package":{"name":"nodejs-full-i18n","ecosystem":"Red Hat:rhel_eus:9.0::appstream","purl":"pkg:rpm/redhat/nodejs-full-i18n"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:16.20.2-1.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:5533.json"}},{"package":{"name":"nodejs-libs","ecosystem":"Red Hat:rhel_eus:9.0::appstream","purl":"pkg:rpm/redhat/nodejs-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:16.20.2-1.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:5533.json"}},{"package":{"name":"nodejs-libs-debuginfo","ecosystem":"Red Hat:rhel_eus:9.0::appstream","purl":"pkg:rpm/redhat/nodejs-libs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:16.20.2-1.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:5533.json"}},{"package":{"name":"npm","ecosystem":"Red Hat:rhel_eus:9.0::appstream","purl":"pkg:rpm/redhat/npm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:8.19.4-1.16.20.2.1.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:5533.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}