summaryrefslogtreecommitdiff
path: root/doc/changelogs
diff options
context:
space:
mode:
authorJuan José Arboleda <soyjuanarbol@gmail.com>2022-11-02 00:19:20 -0500
committerJuan José Arboleda <soyjuanarbol@gmail.com>2022-11-04 14:26:35 -0500
commit58e8a8c58ec6e9c42ecb382bad422e340d549dec (patch)
tree922ebf2c36141d157c795069eb986c008896bf59 /doc/changelogs
parent9fb612e61cd541076152fe847e0e820fc90d76db (diff)
downloadnode-new-58e8a8c58ec6e9c42ecb382bad422e340d549dec.tar.gz
2022-11-04, Version 18.12.1 'Hydrogen' (LTS)
This is a security release. Notable changes: The following CVEs are fixed in this release: - CVE-2022-3602: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-3786: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP address (Medium) PR-URL: https://github.com/nodejs-private/node-private/pull/365
Diffstat (limited to 'doc/changelogs')
-rw-r--r--doc/changelogs/CHANGELOG_V18.md23
1 files changed, 23 insertions, 0 deletions
diff --git a/doc/changelogs/CHANGELOG_V18.md b/doc/changelogs/CHANGELOG_V18.md
index 6a6dead8a9..625c96f30c 100644
--- a/doc/changelogs/CHANGELOG_V18.md
+++ b/doc/changelogs/CHANGELOG_V18.md
@@ -9,6 +9,7 @@
</tr>
<tr>
<td>
+<a href="#18.12.1">18.12.1</a><br/>
<a href="#18.12.0">18.12.0</a><br/>
</td>
<td>
@@ -50,6 +51,28 @@
* [io.js](CHANGELOG_IOJS.md)
* [Archive](CHANGELOG_ARCHIVE.md)
+<a id="18.12.1"></a>
+
+## 2022-11-03, Version 18.12.1 'Hydrogen' (LTS), @juanarbol
+
+This is a security release.
+
+### Notable changes
+
+The following CVEs are fixed in this release:
+
+* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High)
+* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High)
+* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium)
+
+More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post.
+
+### Commits
+
+* \[[`39f8a672e3`](https://github.com/nodejs/node/commit/39f8a672e3)] - **deps**: update archs files for quictls/openssl-3.0.7+quic [nodejs/node#45286](https://github.com/nodejs/node/pull/45286)
+* \[[`80218127c8`](https://github.com/nodejs/node/commit/80218127c8)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic [nodejs/node#45286](https://github.com/nodejs/node/pull/45286)
+* \[[`165342beac`](https://github.com/nodejs/node/commit/165342beac)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354)
+
<a id="18.12.0"></a>
## 2022-10-25, Version 18.12.0 'Hydrogen' (LTS), @ruyadorno and @RafaelGSS