CVE-2021-22930

Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:nextgen_api:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

05 Jan 2024, 10:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-02 -

03 Nov 2022, 20:41

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html - Mailing List, Third Party Advisory
First Time Debian debian Linux
Debian

06 Oct 2022, 20:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html -

06 Apr 2022, 13:57

Type Values Removed Values Added
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory
First Time Siemens sinec Infrastructure Network Services
Siemens
CPE cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*

10 Mar 2022, 17:41

Type Values Removed Values Added
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf -

03 Dec 2021, 02:55

Type Values Removed Values Added
CPE cpe:2.3:a:netapp:nextgen_api:-:*:*:*:*:*:*:*
References (CONFIRM) https://security.netapp.com/advisory/ntap-20211112-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20211112-0002/ - Third Party Advisory

12 Nov 2021, 09:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20211112-0002/ -

18 Oct 2021, 17:15

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 7.5
v3 : 9.8

15 Oct 2021, 01:30

Type Values Removed Values Added
References (MISC) https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ - (MISC) https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/ - Patch, Vendor Advisory
References (MISC) https://hackerone.com/reports/1238162 - (MISC) https://hackerone.com/reports/1238162 - Permissions Required, Third Party Advisory
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*

07 Oct 2021, 14:20

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-07 14:15

Updated : 2024-01-05 10:15


NVD link : CVE-2021-22930

Mitre link : CVE-2021-22930

CVE.ORG link : CVE-2021-22930


JSON object : View

Products Affected

nodejs

  • node.js

debian

  • debian_linux

netapp

  • nextgen_api

siemens

  • sinec_infrastructure_network_services
CWE
CWE-416

Use After Free