Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
| https://hackerone.com/reports/1238162 | Permissions Required Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html | Mailing List Third Party Advisory |
| https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ | Patch Vendor Advisory |
| https://security.gentoo.org/glsa/202401-02 | |
| https://security.netapp.com/advisory/ntap-20211112-0002/ | Third Party Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
| https://hackerone.com/reports/1238162 | Permissions Required Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html | Mailing List Third Party Advisory |
| https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ | Patch Vendor Advisory |
| https://security.gentoo.org/glsa/202401-02 | |
| https://security.netapp.com/advisory/ntap-20211112-0002/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory | |
| References | () https://hackerone.com/reports/1238162 - Permissions Required, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html - Mailing List, Third Party Advisory | |
| References | () https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ - Patch, Vendor Advisory | |
| References | () https://security.gentoo.org/glsa/202401-02 - | |
| References | () https://security.netapp.com/advisory/ntap-20211112-0002/ - Third Party Advisory |
05 Jan 2024, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2022, 20:41
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
| References |
|
06 Apr 2022, 13:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory | |
| CPE | cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* |
10 Mar 2022, 17:41
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Dec 2021, 02:55
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:netapp:nextgen_api:-:*:*:*:*:*:*:* | |
| References | (CONFIRM) https://security.netapp.com/advisory/ntap-20211112-0002/ - Third Party Advisory |
12 Nov 2021, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Oct 2021, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
15 Oct 2021, 01:30
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-416 | |
| References | (MISC) https://hackerone.com/reports/1238162 - Permissions Required, Third Party Advisory | |
| References | (MISC) https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
07 Oct 2021, 14:20
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-10-07 14:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22930
Mitre link : CVE-2021-22930
CVE.ORG link : CVE-2021-22930
JSON object : View
Products Affected
nodejs
- node.js
debian
- debian_linux
netapp
- nextgen_api
siemens
- sinec_infrastructure_network_services
CWE
CWE-416
Use After Free
