summaryrefslogtreecommitdiff
path: root/doc/changelogs
diff options
context:
space:
mode:
authorRafaelGSS <rafael.nunu@hotmail.com>2022-11-02 15:19:47 -0300
committerRafaelGSS <rafael.nunu@hotmail.com>2022-11-04 14:55:40 -0300
commite4135a1de1d2cabbbe3cefa95dafcab4b8597601 (patch)
tree6095fc34fc0fa6a49647fff190ea8387ae7cc69f /doc/changelogs
parent81123b6658a82210f4646b6f406b02c2778a6819 (diff)
downloadnode-new-e4135a1de1d2cabbbe3cefa95dafcab4b8597601.tar.gz
2022-11-04, Version 19.0.1 (Current)
This is a security release. Notable changes: The following CVEs are fixed in this release: - CVE-2022-3786: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-3602: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP address (Medium) PR-URL: https://github.com/nodejs-private/node-private/pull/366
Diffstat (limited to 'doc/changelogs')
-rw-r--r--doc/changelogs/CHANGELOG_V19.md23
1 files changed, 23 insertions, 0 deletions
diff --git a/doc/changelogs/CHANGELOG_V19.md b/doc/changelogs/CHANGELOG_V19.md
index 3dd293a28a..6a20b3aa26 100644
--- a/doc/changelogs/CHANGELOG_V19.md
+++ b/doc/changelogs/CHANGELOG_V19.md
@@ -8,6 +8,7 @@
</tr>
<tr>
<td>
+<b><a href="#19.0.1">19.0.1</a></b><br/>
<a href="#19.0.0">19.0.0</a><br/>
</td>
</tr>
@@ -34,6 +35,28 @@
* [io.js](CHANGELOG_IOJS.md)
* [Archive](CHANGELOG_ARCHIVE.md)
+<a id="19.0.1"></a>
+
+## 2022-11-04, Version 19.0.1 (Current), @RafaelGSS
+
+This is a security release.
+
+### Notable changes
+
+The following CVEs are fixed in this release:
+
+* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High)
+* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High)
+* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium)
+
+More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post.
+
+### Commits
+
+* \[[`e58e8d70a8`](https://github.com/nodejs/node/commit/e58e8d70a8)] - **deps**: update archs files for quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286)
+* \[[`85f4548d57`](https://github.com/nodejs/node/commit/85f4548d57)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286)
+* \[[`43403f56f7`](https://github.com/nodejs/node/commit/43403f56f7)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354)
+
<a id="19.0.0"></a>
## 2022-10-18, Version 19.0.0 (Current), @RafaelGSS and @ruyadorno