Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
https://hackerone.com/reports/1238162 | Permissions Required Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html | Mailing List Third Party Advisory |
https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202401-02 | |
https://security.netapp.com/advisory/ntap-20211112-0002/ | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
https://hackerone.com/reports/1238162 | Permissions Required Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html | Mailing List Third Party Advisory |
https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202401-02 | |
https://security.netapp.com/advisory/ntap-20211112-0002/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory | |
References | () https://hackerone.com/reports/1238162 - Permissions Required, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html - Mailing List, Third Party Advisory | |
References | () https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ - Patch, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202401-02 - | |
References | () https://security.netapp.com/advisory/ntap-20211112-0002/ - Third Party Advisory |
05 Jan 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Nov 2022, 20:41
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References |
|
06 Apr 2022, 13:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory |
10 Mar 2022, 17:41
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Dec 2021, 02:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:netapp:nextgen_api:-:*:*:*:*:*:*:* | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20211112-0002/ - Third Party Advisory |
12 Nov 2021, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Oct 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
15 Oct 2021, 01:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) https://hackerone.com/reports/1238162 - Permissions Required, Third Party Advisory | |
References | (MISC) https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ - Patch, Vendor Advisory | |
CWE | CWE-416 | |
CPE | cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* |
07 Oct 2021, 14:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-07 14:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22930
Mitre link : CVE-2021-22930
CVE.ORG link : CVE-2021-22930
JSON object : View
Products Affected
debian
- debian_linux
nodejs
- node.js
siemens
- sinec_infrastructure_network_services
netapp
- nextgen_api
CWE
CWE-416
Use After Free