summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRafaelGSS <rafael.nunu@hotmail.com>2022-11-02 15:19:47 -0300
committerRafaelGSS <rafael.nunu@hotmail.com>2022-11-04 14:55:40 -0300
commite4135a1de1d2cabbbe3cefa95dafcab4b8597601 (patch)
tree6095fc34fc0fa6a49647fff190ea8387ae7cc69f
parent81123b6658a82210f4646b6f406b02c2778a6819 (diff)
downloadnode-new-e4135a1de1d2cabbbe3cefa95dafcab4b8597601.tar.gz
2022-11-04, Version 19.0.1 (Current)
This is a security release. Notable changes: The following CVEs are fixed in this release: - CVE-2022-3786: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-3602: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP address (Medium) PR-URL: https://github.com/nodejs-private/node-private/pull/366
-rw-r--r--CHANGELOG.md3
-rw-r--r--doc/changelogs/CHANGELOG_V19.md23
-rw-r--r--src/node_version.h2
3 files changed, 26 insertions, 2 deletions
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 8ad8e2e4ac..8731f4c0e2 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -35,7 +35,8 @@ release.
</tr>
<tr>
<td valign="top">
-<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a></b><br/>
+<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.1">19.0.1</a></b><br/>
+<a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a><br/>
</td>
<td valign="top">
<b><a href="doc/changelogs/CHANGELOG_V18.md#18.12.0">18.12.0</a></b><br/>
diff --git a/doc/changelogs/CHANGELOG_V19.md b/doc/changelogs/CHANGELOG_V19.md
index 3dd293a28a..6a20b3aa26 100644
--- a/doc/changelogs/CHANGELOG_V19.md
+++ b/doc/changelogs/CHANGELOG_V19.md
@@ -8,6 +8,7 @@
</tr>
<tr>
<td>
+<b><a href="#19.0.1">19.0.1</a></b><br/>
<a href="#19.0.0">19.0.0</a><br/>
</td>
</tr>
@@ -34,6 +35,28 @@
* [io.js](CHANGELOG_IOJS.md)
* [Archive](CHANGELOG_ARCHIVE.md)
+<a id="19.0.1"></a>
+
+## 2022-11-04, Version 19.0.1 (Current), @RafaelGSS
+
+This is a security release.
+
+### Notable changes
+
+The following CVEs are fixed in this release:
+
+* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High)
+* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High)
+* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium)
+
+More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post.
+
+### Commits
+
+* \[[`e58e8d70a8`](https://github.com/nodejs/node/commit/e58e8d70a8)] - **deps**: update archs files for quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286)
+* \[[`85f4548d57`](https://github.com/nodejs/node/commit/85f4548d57)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286)
+* \[[`43403f56f7`](https://github.com/nodejs/node/commit/43403f56f7)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354)
+
<a id="19.0.0"></a>
## 2022-10-18, Version 19.0.0 (Current), @RafaelGSS and @ruyadorno
diff --git a/src/node_version.h b/src/node_version.h
index 5549c214df..7d150afcec 100644
--- a/src/node_version.h
+++ b/src/node_version.h
@@ -29,7 +29,7 @@
#define NODE_VERSION_IS_LTS 0
#define NODE_VERSION_LTS_CODENAME ""
-#define NODE_VERSION_IS_RELEASE 0
+#define NODE_VERSION_IS_RELEASE 1
#ifndef NODE_STRINGIFY
#define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n)