diff options
author | RafaelGSS <rafael.nunu@hotmail.com> | 2022-11-02 21:19:47 +0300 |
---|---|---|
committer | RafaelGSS <rafael.nunu@hotmail.com> | 2022-11-04 17:47:46 +0300 |
commit | 6ac3a22f89ae43402d41166baf44266e60595fcb (patch) | |
tree | 8d3e3f3e70b5d4d959f3cbcbce1e70bdb40787e5 | |
parent | e58e8d70a84e8f8fdb9bba7c00012e1adda3db2b (diff) |
2022-11-04, Version 19.0.1 (Current)v19.0.1
This is a security release.
Notable changes:
The following CVEs are fixed in this release:
- CVE-2022-3786: A buffer overrun can be triggered in X.509
certificate verification (High)
- CVE-2022-3602: A buffer overrun can be triggered in X.509
certificate verification (High)
- CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP
address (Medium)
PR-URL: https://github.com/nodejs-private/node-private/pull/366
-rw-r--r-- | CHANGELOG.md | 3 | ||||
-rw-r--r-- | doc/changelogs/CHANGELOG_V19.md | 23 | ||||
-rw-r--r-- | src/node_version.h | 2 |
3 files changed, 26 insertions, 2 deletions
diff --git a/CHANGELOG.md b/CHANGELOG.md index 70b79d53ae0..4968e50a920 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -37,7 +37,8 @@ release. </tr> <tr> <td valign="top"> -<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a></b><br/> +<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.1">19.0.1</a></b><br/> +<a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a><br/> </td> <td valign="top"> <b><a href="doc/changelogs/CHANGELOG_V18.md#18.11.0">18.11.0</a></b><br/> diff --git a/doc/changelogs/CHANGELOG_V19.md b/doc/changelogs/CHANGELOG_V19.md index 3dd293a28a3..6a20b3aa264 100644 --- a/doc/changelogs/CHANGELOG_V19.md +++ b/doc/changelogs/CHANGELOG_V19.md @@ -8,6 +8,7 @@ </tr> <tr> <td> +<b><a href="#19.0.1">19.0.1</a></b><br/> <a href="#19.0.0">19.0.0</a><br/> </td> </tr> @@ -34,6 +35,28 @@ * [io.js](CHANGELOG_IOJS.md) * [Archive](CHANGELOG_ARCHIVE.md) +<a id="19.0.1"></a> + +## 2022-11-04, Version 19.0.1 (Current), @RafaelGSS + +This is a security release. + +### Notable changes + +The following CVEs are fixed in this release: + +* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High) +* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High) +* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium) + +More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post. + +### Commits + +* \[[`e58e8d70a8`](https://github.com/nodejs/node/commit/e58e8d70a8)] - **deps**: update archs files for quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286) +* \[[`85f4548d57`](https://github.com/nodejs/node/commit/85f4548d57)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286) +* \[[`43403f56f7`](https://github.com/nodejs/node/commit/43403f56f7)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354) + <a id="19.0.0"></a> ## 2022-10-18, Version 19.0.0 (Current), @RafaelGSS and @ruyadorno diff --git a/src/node_version.h b/src/node_version.h index 21e6dee5878..9e951f208c6 100644 --- a/src/node_version.h +++ b/src/node_version.h @@ -29,7 +29,7 @@ #define NODE_VERSION_IS_LTS 0 #define NODE_VERSION_LTS_CODENAME "" -#define NODE_VERSION_IS_RELEASE 0 +#define NODE_VERSION_IS_RELEASE 1 #ifndef NODE_STRINGIFY #define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n) |