Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
https://hackerone.com/reports/1238162 | Permissions Required Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html | Mailing List Third Party Advisory |
https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202401-02 | |
https://security.netapp.com/advisory/ntap-20210923-0001/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: hackerone
Published: 2021-08-16T00:00:00
Updated: 2024-01-05T10:06:24.062966
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-22940
JSON object: View
NVD Information
Status : Modified
Published: 2021-08-16T19:15:13.987
Modified: 2024-01-05T10:15:10.103
Link: CVE-2021-22940
JSON object: View
Redhat Information
No data.
CWE