CVE-2021-22930

NameCVE-2021-22930
DescriptionUse after free on close http2 on stream canceling
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nodejs (PTS)stretch4.8.2~dfsg-1vulnerable
buster, buster (security)10.24.0~dfsg-1~deb10u1vulnerable
bullseye12.21.0~dfsg-5vulnerable
bullseye (security)12.22.5~dfsg-2~11u1fixed
bookworm12.22.5~dfsg-2fixed
sid12.22.5~dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nodejssourcestretch(unfixed)end-of-life
nodejssourcebullseye12.22.5~dfsg-2~11u1
nodejssource(unstable)12.22.4~dfsg-1

Notes

[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
https://github.com/nodejs/node/commit/b263f2585ab53f56e0e22b46cf1f8519a8af8a05
https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/#use-after-free-on-close-http2-on-stream-canceling-high-cve-2021-22930
Possible incomplete fix (at least for v12): https://github.com/nodejs/node/issues/38964#issuecomment-889936936
CVE for the incomplete fix tracked as CVE-2021-22940

Search for package or bug name: Reporting problems