UBUNTU-CVE-2026-21711

Source
https://ubuntu.com/security/CVE-2026-21711
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-21711.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-21711
Upstream
  • CVE-2026-21711
Published
2026-03-30T20:16:00Z
Modified
2026-04-02T21:08:00.844160Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them. As a result, code running under --permission without --allow-net can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary. This vulnerability affects Node.js 25.x processes using the Permission Model where --allow-net is intentionally omitted to restrict network access. Note that --allow-net is currently an experimental feature.

References

Affected packages

Ubuntu:24.04:LTS
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@18.19.1+dfsg-6ubuntu5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

18.*
18.13.0+dfsg1-1ubuntu2
18.19.1+dfsg-2ubuntu4
18.19.1+dfsg-6ubuntu1
18.19.1+dfsg-6ubuntu2
18.19.1+dfsg-6ubuntu5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libnode-dev",
            "binary_version": "18.19.1+dfsg-6ubuntu5"
        },
        {
            "binary_name": "libnode109",
            "binary_version": "18.19.1+dfsg-6ubuntu5"
        },
        {
            "binary_name": "nodejs",
            "binary_version": "18.19.1+dfsg-6ubuntu5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-21711.json"
Ubuntu:25.10
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@20.19.4+dfsg-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*
20.18.1+dfsg-1ubuntu2
20.19.2+dfsg-1
20.19.4+dfsg-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libnode-dev",
            "binary_version": "20.19.4+dfsg-1"
        },
        {
            "binary_name": "libnode115",
            "binary_version": "20.19.4+dfsg-1"
        },
        {
            "binary_name": "nodejs",
            "binary_version": "20.19.4+dfsg-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-21711.json"
Ubuntu:Pro:14.04:LTS
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@0.10.25~dfsg2-2ubuntu1.2+esm2?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.10.15~dfsg1-4
0.10.21~dfsg1-1
0.10.22~dfsg1-2
0.10.23~dfsg1-1
0.10.23~dfsg1-2
0.10.23~dfsg1-3
0.10.24~dfsg1-1
0.10.25~dfsg2-2
0.10.25~dfsg2-2ubuntu1
0.10.25~dfsg2-2ubuntu1.2
0.10.25~dfsg2-2ubuntu1.2+esm1
0.10.25~dfsg2-2ubuntu1.2+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "nodejs",
            "binary_version": "0.10.25~dfsg2-2ubuntu1.2+esm2"
        },
        {
            "binary_name": "nodejs-dev",
            "binary_version": "0.10.25~dfsg2-2ubuntu1.2+esm2"
        },
        {
            "binary_name": "nodejs-legacy",
            "binary_version": "0.10.25~dfsg2-2ubuntu1.2+esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-21711.json"
Ubuntu:Pro:16.04:LTS
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@4.2.6~dfsg-1ubuntu4.2+esm3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.10.25~dfsg2-2ubuntu1
4.*
4.2.2~dfsg-1
4.2.3~dfsg-1
4.2.4~dfsg-1ubuntu1
4.2.4~dfsg-2
4.2.6~dfsg-1ubuntu1
4.2.6~dfsg-1ubuntu4
4.2.6~dfsg-1ubuntu4.1
4.2.6~dfsg-1ubuntu4.2
4.2.6~dfsg-1ubuntu4.2+esm1
4.2.6~dfsg-1ubuntu4.2+esm2
4.2.6~dfsg-1ubuntu4.2+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "nodejs",
            "binary_version": "4.2.6~dfsg-1ubuntu4.2+esm3"
        },
        {
            "binary_name": "nodejs-dev",
            "binary_version": "4.2.6~dfsg-1ubuntu4.2+esm3"
        },
        {
            "binary_name": "nodejs-legacy",
            "binary_version": "4.2.6~dfsg-1ubuntu4.2+esm3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-21711.json"
Ubuntu:Pro:18.04:LTS
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@8.10.0~dfsg-2ubuntu0.4+esm6?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.11.4~dfsg-1ubuntu1
6.11.4~dfsg-1ubuntu2
6.12.0~dfsg-1ubuntu1
6.12.0~dfsg-2ubuntu1
6.12.0~dfsg-2ubuntu2
8.*
8.10.0~dfsg-2
8.10.0~dfsg-2ubuntu0.2
8.10.0~dfsg-2ubuntu0.3
8.10.0~dfsg-2ubuntu0.4
8.10.0~dfsg-2ubuntu0.4+esm1
8.10.0~dfsg-2ubuntu0.4+esm2
8.10.0~dfsg-2ubuntu0.4+esm3
8.10.0~dfsg-2ubuntu0.4+esm4
8.10.0~dfsg-2ubuntu0.4+esm5
8.10.0~dfsg-2ubuntu0.4+esm6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "nodejs",
            "binary_version": "8.10.0~dfsg-2ubuntu0.4+esm6"
        },
        {
            "binary_name": "nodejs-dev",
            "binary_version": "8.10.0~dfsg-2ubuntu0.4+esm6"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-21711.json"
Ubuntu:Pro:20.04:LTS
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@10.19.0~dfsg-3ubuntu1.6+esm2?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*
10.15.2~dfsg-2ubuntu1
10.17.0~dfsg-2ubuntu4
10.17.0~dfsg-2ubuntu6
10.19.0~dfsg-3ubuntu1
10.19.0~dfsg-3ubuntu1.1
10.19.0~dfsg-3ubuntu1.2
10.19.0~dfsg-3ubuntu1.3
10.19.0~dfsg-3ubuntu1.5
10.19.0~dfsg-3ubuntu1.6
10.19.0~dfsg-3ubuntu1.6+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libnode-dev",
            "binary_version": "10.19.0~dfsg-3ubuntu1.6+esm2"
        },
        {
            "binary_name": "libnode64",
            "binary_version": "10.19.0~dfsg-3ubuntu1.6+esm2"
        },
        {
            "binary_name": "nodejs",
            "binary_version": "10.19.0~dfsg-3ubuntu1.6+esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-21711.json"
Ubuntu:Pro:22.04:LTS
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@12.22.9~dfsg-1ubuntu3.6+esm2?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

12.*
12.22.5~dfsg-5ubuntu1
12.22.7~dfsg-2ubuntu1
12.22.7~dfsg-2ubuntu3
12.22.9~dfsg-1ubuntu2
12.22.9~dfsg-1ubuntu3
12.22.9~dfsg-1ubuntu3.1
12.22.9~dfsg-1ubuntu3.2
12.22.9~dfsg-1ubuntu3.3
12.22.9~dfsg-1ubuntu3.4
12.22.9~dfsg-1ubuntu3.5
12.22.9~dfsg-1ubuntu3.6
12.22.9~dfsg-1ubuntu3.6+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libnode-dev",
            "binary_version": "12.22.9~dfsg-1ubuntu3.6+esm2"
        },
        {
            "binary_name": "libnode72",
            "binary_version": "12.22.9~dfsg-1ubuntu3.6+esm2"
        },
        {
            "binary_name": "nodejs",
            "binary_version": "12.22.9~dfsg-1ubuntu3.6+esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-21711.json"