diff options
author | RafaelGSS <rafael.nunu@hotmail.com> | 2022-11-02 15:19:47 -0300 |
---|---|---|
committer | RafaelGSS <rafael.nunu@hotmail.com> | 2022-11-04 14:55:40 -0300 |
commit | e4135a1de1d2cabbbe3cefa95dafcab4b8597601 (patch) | |
tree | 6095fc34fc0fa6a49647fff190ea8387ae7cc69f | |
parent | 81123b6658a82210f4646b6f406b02c2778a6819 (diff) | |
download | node-new-e4135a1de1d2cabbbe3cefa95dafcab4b8597601.tar.gz |
2022-11-04, Version 19.0.1 (Current)
This is a security release.
Notable changes:
The following CVEs are fixed in this release:
- CVE-2022-3786: A buffer overrun can be triggered in X.509
certificate verification (High)
- CVE-2022-3602: A buffer overrun can be triggered in X.509
certificate verification (High)
- CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP
address (Medium)
PR-URL: https://github.com/nodejs-private/node-private/pull/366
-rw-r--r-- | CHANGELOG.md | 3 | ||||
-rw-r--r-- | doc/changelogs/CHANGELOG_V19.md | 23 | ||||
-rw-r--r-- | src/node_version.h | 2 |
3 files changed, 26 insertions, 2 deletions
diff --git a/CHANGELOG.md b/CHANGELOG.md index 8ad8e2e4ac..8731f4c0e2 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -35,7 +35,8 @@ release. </tr> <tr> <td valign="top"> -<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a></b><br/> +<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.1">19.0.1</a></b><br/> +<a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a><br/> </td> <td valign="top"> <b><a href="doc/changelogs/CHANGELOG_V18.md#18.12.0">18.12.0</a></b><br/> diff --git a/doc/changelogs/CHANGELOG_V19.md b/doc/changelogs/CHANGELOG_V19.md index 3dd293a28a..6a20b3aa26 100644 --- a/doc/changelogs/CHANGELOG_V19.md +++ b/doc/changelogs/CHANGELOG_V19.md @@ -8,6 +8,7 @@ </tr> <tr> <td> +<b><a href="#19.0.1">19.0.1</a></b><br/> <a href="#19.0.0">19.0.0</a><br/> </td> </tr> @@ -34,6 +35,28 @@ * [io.js](CHANGELOG_IOJS.md) * [Archive](CHANGELOG_ARCHIVE.md) +<a id="19.0.1"></a> + +## 2022-11-04, Version 19.0.1 (Current), @RafaelGSS + +This is a security release. + +### Notable changes + +The following CVEs are fixed in this release: + +* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High) +* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High) +* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium) + +More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post. + +### Commits + +* \[[`e58e8d70a8`](https://github.com/nodejs/node/commit/e58e8d70a8)] - **deps**: update archs files for quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286) +* \[[`85f4548d57`](https://github.com/nodejs/node/commit/85f4548d57)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286) +* \[[`43403f56f7`](https://github.com/nodejs/node/commit/43403f56f7)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354) + <a id="19.0.0"></a> ## 2022-10-18, Version 19.0.0 (Current), @RafaelGSS and @ruyadorno diff --git a/src/node_version.h b/src/node_version.h index 5549c214df..7d150afcec 100644 --- a/src/node_version.h +++ b/src/node_version.h @@ -29,7 +29,7 @@ #define NODE_VERSION_IS_LTS 0 #define NODE_VERSION_LTS_CODENAME "" -#define NODE_VERSION_IS_RELEASE 0 +#define NODE_VERSION_IS_RELEASE 1 #ifndef NODE_STRINGIFY #define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n) |