Skip to content

Commit e2cd2f4

Browse files
targosdanielleadams
authored andcommitted
doc: fix CVE-2021-22940 references
Fixes: #40306 PR-URL: #40308 Reviewed-By: Matteo Collina <[email protected]> Reviewed-By: Colin Ihrig <[email protected]> Reviewed-By: Tobias Nießen <[email protected]> Reviewed-By: Beth Griggs <[email protected]> Reviewed-By: Vladimir de Turckheim <[email protected]> Reviewed-By: Michael Dawson <[email protected]> Reviewed-By: Luigi Pinca <[email protected]> Reviewed-By: Rich Trott <[email protected]> Reviewed-By: Juan José Arboleda <[email protected]>
1 parent 88bdbf1 commit e2cd2f4

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

doc/changelogs/CHANGELOG_V16.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -467,8 +467,8 @@ This is a security release.
467467

468468
* **CVE-2021-3672/CVE-2021-22931**: Improper handling of untypical characters in domain names (High)
469469
* Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library which can lead to the output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library. You can read more about it at https://nvd.nist.gov/vuln/detail/CVE-2021-22931.
470-
* **CVE-2021-22930**: Use after free on close http2 on stream canceling (High)
471-
* Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. This release includes a follow-up fix for CVE-2021-22930 as the issue was not completely resolved by the previous fix. You can read more about it at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930.
470+
* **CVE-2021-22940**: Use after free on close http2 on stream canceling (High)
471+
* Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. This release includes a follow-up fix for CVE-2021-22930 as the issue was not completely resolved by the previous fix. You can read more about it at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940.
472472
* **CVE-2021-22939**: Incomplete validation of rejectUnauthorized parameter (Low)
473473
* If the Node.js HTTPS API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted. You can read more about it at https://nvd.nist.gov/vuln/detail/CVE-2021-22939.
474474

0 commit comments

Comments
 (0)