Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
References
Link | Resource |
---|---|
https://hackerone.com/reports/1238162 | Permissions Required Third Party Advisory |
https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ | Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210923-0001/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Patch Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2021-08-16 12:15
Updated : 2022-11-03 13:41
NVD link : CVE-2021-22940
Mitre link : CVE-2021-22940
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
oracle
- graalvm
- peoplesoft_enterprise_peopletools
- jd_edwards_enterpriseone_tools
nodejs
- node.js
debian
- debian_linux
siemens
- sinec_infrastructure_network_services
netapp
- nextgen_api