summaryrefslogtreecommitdiff
path: root/doc/changelogs/CHANGELOG_V14.md
diff options
context:
space:
mode:
authorRichard Lau <rlau@redhat.com>2021-06-28 11:59:32 +0100
committerRichard Lau <rlau@redhat.com>2021-07-01 14:48:10 +0100
commit0969b9f0e899e4149029fde03904f6447beba8ef (patch)
treeac436f004ceec285a1bd2346a8d5c53e1865ac26 /doc/changelogs/CHANGELOG_V14.md
parent9b7eb82a42bb9ed4890e386ba748d0d9bff1468e (diff)
downloadnode-new-0969b9f0e899e4149029fde03904f6447beba8ef.tar.gz
2021-07-01, Version 14.17.2 'Fermium' (LTS)
This is a security release. Notable changes: Vulnerabilities fixed: - **CVE-2021-22918**: libuv upgrade - Out of bounds read (Medium) - **CVE-2021-22921**: Windows installer - Node Installer Local Privilege Escalation (Medium) PR-URL: https://github.com/nodejs-private/node-private/pull/272
Diffstat (limited to 'doc/changelogs/CHANGELOG_V14.md')
-rw-r--r--doc/changelogs/CHANGELOG_V14.md20
1 files changed, 20 insertions, 0 deletions
diff --git a/doc/changelogs/CHANGELOG_V14.md b/doc/changelogs/CHANGELOG_V14.md
index 4ffeefe14c..397cb5534d 100644
--- a/doc/changelogs/CHANGELOG_V14.md
+++ b/doc/changelogs/CHANGELOG_V14.md
@@ -11,6 +11,7 @@
</tr>
<tr>
<td valign="top">
+<a href="#14.17.2">14.17.2</a><br/>
<a href="#14.17.1">14.17.1</a><br/>
<a href="#14.17.0">14.17.0</a><br/>
<a href="#14.16.1">14.16.1</a><br/>
@@ -62,6 +63,25 @@
* [io.js](CHANGELOG_IOJS.md)
* [Archive](CHANGELOG_ARCHIVE.md)
+<a id="14.17.2"></a>
+## 2021-07-01, Version 14.17.2 'Fermium' (LTS), @richardlau
+
+This is a security release.
+
+### Notable Changes
+
+Vulnerabilities fixed:
+
+* **CVE-2021-22918**: libuv upgrade - Out of bounds read (Medium)
+ * Node.js is vulnerable to out-of-bounds read in libuv's uv__idna_toascii() function which is used to convert strings to ASCII. This is called by Node's dns module's lookup() function and can lead to information disclosures or crashes. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918
+* **CVE-2021-22921**: Windows installer - Node Installer Local Privilege Escalation (Medium)
+ * Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22921
+
+### Commits
+
+* [[`a7496aba0a`](https://github.com/nodejs/node/commit/a7496aba0a)] - **deps**: uv: cherry-pick 99c29c9c2c9b (Ben Noordhuis) [nodejs-private/node-private#267](https://github.com/nodejs-private/node-private/pull/267)
+* [[`d0b449da1d`](https://github.com/nodejs/node/commit/d0b449da1d)] - **win,msi**: set install directory permission (AkshayK) [nodejs-private/node-private#269](https://github.com/nodejs-private/node-private/pull/269)
+
<a id="14.17.1"></a>
## 2021-06-15, Version 14.17.1 'Fermium' (LTS), @targos