{"affected":[{"ecosystem_specific":{"binaries":[{"nodejs16":"16.20.2-150300.7.27.2","nodejs16-devel":"16.20.2-150300.7.27.2","nodejs16-docs":"16.20.2-150300.7.27.2","npm16":"16.20.2-150300.7.27.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-ESPOS","name":"nodejs16","purl":"pkg:rpm/suse/nodejs16&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.20.2-150300.7.27.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs16":"16.20.2-150300.7.27.2","nodejs16-devel":"16.20.2-150300.7.27.2","nodejs16-docs":"16.20.2-150300.7.27.2","npm16":"16.20.2-150300.7.27.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-LTSS","name":"nodejs16","purl":"pkg:rpm/suse/nodejs16&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.20.2-150300.7.27.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs16":"16.20.2-150300.7.27.2","nodejs16-devel":"16.20.2-150300.7.27.2","nodejs16-docs":"16.20.2-150300.7.27.2","npm16":"16.20.2-150300.7.27.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"nodejs16","purl":"pkg:rpm/suse/nodejs16&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.20.2-150300.7.27.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs16":"16.20.2-150300.7.27.2","nodejs16-devel":"16.20.2-150300.7.27.2","nodejs16-docs":"16.20.2-150300.7.27.2","npm16":"16.20.2-150300.7.27.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"nodejs16","purl":"pkg:rpm/suse/nodejs16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.20.2-150300.7.27.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs16":"16.20.2-150300.7.27.2","nodejs16-devel":"16.20.2-150300.7.27.2","nodejs16-docs":"16.20.2-150300.7.27.2","npm16":"16.20.2-150300.7.27.2"}]},"package":{"ecosystem":"SUSE:Manager Server 4.2","name":"nodejs16","purl":"pkg:rpm/suse/nodejs16&distro=SUSE%20Manager%20Server%204.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.20.2-150300.7.27.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs16":"16.20.2-150300.7.27.2","nodejs16-devel":"16.20.2-150300.7.27.2","nodejs16-docs":"16.20.2-150300.7.27.2","npm16":"16.20.2-150300.7.27.2"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"nodejs16","purl":"pkg:rpm/suse/nodejs16&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.20.2-150300.7.27.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nodejs16 fixes the following issues:\n\nUpdate to LTS version 16.20.2.\n\n- CVE-2023-32002: Fixed permissions policies bypass via Module._load (bsc#1214150).\n- CVE-2023-32006: Fixed permissions policies impersonation using module.constructor.createRequire() (bsc#1214156).\n- CVE-2023-32559: Fixed permissions policies bypass via process.binding (bsc#1214154).\n","id":"SUSE-SU-2023:3400-1","modified":"2023-08-23T17:01:05Z","published":"2023-08-23T17:01:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233400-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214150"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-32002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-32006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-32559"}],"related":["CVE-2023-32002","CVE-2023-32006","CVE-2023-32559"],"summary":"Security update for nodejs16","upstream":["CVE-2023-32002","CVE-2023-32006","CVE-2023-32559"]}