diff options
author | Beth Griggs <bgriggs@redhat.com> | 2020-12-24 17:21:21 +0300 |
---|---|---|
committer | Beth Griggs <bgriggs@redhat.com> | 2020-12-24 17:36:31 +0300 |
commit | 04509d6847a2d164b223a77aed0c41fe9ca60e57 (patch) | |
tree | 9bb5160537d45aa3d5750415845a93319b6f004d | |
parent | 4f8772f9b731118628256189b73cd202149bbd97 (diff) |
2021-01-04, Version 14.15.4 'Fermium' (LTS)v14.15.4
This is a security release.
Notable changes:
Vulnerabilities fixed:
- **CVE-2020-1971**: OpenSSL - EDIPARTYNAME NULL pointer de-reference
(High)
- This is a vulnerability in OpenSSL which may be exploited through
Node.js. You can read more about it in
https://www.openssl.org/news/secadv/20201208.txt
- **CVE-2020-8265**: use-after-free in TLSWrap (High)
- Affected Node.js versions are vulnerable to a use-after-free bug in
its TLS implementation. When writing to a TLS enabled socket,
node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly
allocated WriteWrap object as first argument. If the DoWrite method
does not return an error, this object is passed back to the caller as
part of a StreamWriteResult structure. This may be exploited to
corrupt memory leading to a Denial of Service or potentially other
exploits.
- **CVE-2020-8287**: HTTP Request Smuggling in nodejs (Low)
- Affected versions of Node.js allow two copies of a header field in
a http request. For example, two Transfer-Encoding header fields. In
this case Node.js identifies the first header field and ignores the
second. This can lead to HTTP Request Smuggling
(https://cwe.mitre.org/data/definitions/444.html).
PR-URL: https://github.com/nodejs-private/node-private/pull/242
-rw-r--r-- | CHANGELOG.md | 3 | ||||
-rw-r--r-- | doc/changelogs/CHANGELOG_V14.md | 41 | ||||
-rw-r--r-- | src/node_version.h | 2 |
3 files changed, 44 insertions, 2 deletions
diff --git a/CHANGELOG.md b/CHANGELOG.md index 8dd445bcf5c..5e9bb9bb11d 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -30,7 +30,8 @@ release. </tr> <tr> <td valign="top"> -<b><a href="doc/changelogs/CHANGELOG_V14.md#14.15.3">14.15.3</a></b><br/> +<b><a href="doc/changelogs/CHANGELOG_V14.md#14.15.4">14.15.4</a></b><br/> +<a href="doc/changelogs/CHANGELOG_V14.md#14.15.3">14.15.3</a><br/> <a href="doc/changelogs/CHANGELOG_V14.md#14.15.2">14.15.2</a><br/> <a href="doc/changelogs/CHANGELOG_V14.md#14.15.1">14.15.1</a><br/> <a href="doc/changelogs/CHANGELOG_V14.md#14.15.0">14.15.0</a><br/> diff --git a/doc/changelogs/CHANGELOG_V14.md b/doc/changelogs/CHANGELOG_V14.md index b4320d74055..290998d764a 100644 --- a/doc/changelogs/CHANGELOG_V14.md +++ b/doc/changelogs/CHANGELOG_V14.md @@ -11,6 +11,7 @@ </tr> <tr> <td valign="top"> +<a href="#14.15.4">14.15.4</a><br/> <a href="#14.15.3">14.15.3</a><br/> <a href="#14.15.2">14.15.2</a><br/> <a href="#14.15.1">14.15.1</a><br/> @@ -54,6 +55,46 @@ * [io.js](CHANGELOG_IOJS.md) * [Archive](CHANGELOG_ARCHIVE.md) +<a id="14.15.4"></a> +## 2021-01-04, Version 14.15.4 'Fermium' (LTS), @BethGriggs + +This is a security release. + +### Notable Changes + +Vulnerabilities fixed: + +* **CVE-2020-1971**: OpenSSL - EDIPARTYNAME NULL pointer de-reference (High) + * This is a vulnerability in OpenSSL which may be exploited through + Node.js. You can read more about it in + https://www.openssl.org/news/secadv/20201208.txt + +* **CVE-2020-8265**: use-after-free in TLSWrap (High) + * Affected Node.js versions are vulnerable to a use-after-free bug in + its TLS implementation. When writing to a TLS enabled socket, + node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly + allocated WriteWrap object as first argument. If the DoWrite method + does not return an error, this object is passed back to the caller as + part of a StreamWriteResult structure. This may be exploited to + corrupt memory leading to a Denial of Service or potentially other + exploits. + +* **CVE-2020-8287**: HTTP Request Smuggling in nodejs (Low) + * Affected versions of Node.js allow two copies of a header field in + a http request. For example, two Transfer-Encoding header fields. In + this case Node.js identifies the first header field and ignores the + second. This can lead to HTTP Request Smuggling + (https://cwe.mitre.org/data/definitions/444.html). + +### Commits + +* [[`305c0f4977`](https://github.com/nodejs/node/commit/305c0f4977)] - **deps**: upgrade npm to 6.14.10 (Ruy Adorno) [#36571](https://github.com/nodejs/node/pull/36571) +* [[`d62c650f75`](https://github.com/nodejs/node/commit/d62c650f75)] - **deps**: update archs files for OpenSSL-1.1.1i (Myles Borins) [#36521](https://github.com/nodejs/node/pull/36521) +* [[`2de2672eb5`](https://github.com/nodejs/node/commit/2de2672eb5)] - **deps**: upgrade openssl sources to 1.1.1i (Myles Borins) [#36521](https://github.com/nodejs/node/pull/36521) +* [[`7ecac8143f`](https://github.com/nodejs/node/commit/7ecac8143f)] - **http**: add test for http transfer encoding smuggling (Matteo Collina) [nodejs-private/node-private#228](https://github.com/nodejs-private/node-private/pull/228) +* [[`641f786bb1`](https://github.com/nodejs/node/commit/641f786bb1)] - **http**: unset `F_CHUNKED` on new `Transfer-Encoding` (Matteo Collina) [nodejs-private/node-private#228](https://github.com/nodejs-private/node-private/pull/228) +* [[`4f8772f9b7`](https://github.com/nodejs/node/commit/4f8772f9b7)] - **src**: retain pointers to WriteWrap/ShutdownWrap (James M Snell) [nodejs-private/node-private#23](https://github.com/nodejs-private/node-private/pull/23) + <a id="14.15.3"></a> ## 2020-12-17, Version 14.15.3 'Fermium' (LTS), @BethGriggs diff --git a/src/node_version.h b/src/node_version.h index caf3188be57..88a4c898700 100644 --- a/src/node_version.h +++ b/src/node_version.h @@ -29,7 +29,7 @@ #define NODE_VERSION_IS_LTS 1 #define NODE_VERSION_LTS_CODENAME "Fermium" -#define NODE_VERSION_IS_RELEASE 0 +#define NODE_VERSION_IS_RELEASE 1 #ifndef NODE_STRINGIFY #define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n) |