Skip to content

Commit 55b2d8e

Browse files
RafaelGSSlucshi
authored andcommitted
2022-11-04, Version 19.0.1 (Current)
This is a security release. Notable changes: The following CVEs are fixed in this release: - CVE-2022-3786: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-3602: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP address (Medium) PR-URL: nodejs-private/node-private#366
1 parent 4fe78da commit 55b2d8e

File tree

3 files changed

+26
-2
lines changed

3 files changed

+26
-2
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,8 @@ release.
3535
</tr>
3636
<tr>
3737
<td valign="top">
38-
<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a></b><br/>
38+
<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.1">19.0.1</a></b><br/>
39+
<a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a><br/>
3940
</td>
4041
<td valign="top">
4142
<b><a href="doc/changelogs/CHANGELOG_V18.md#18.12.0">18.12.0</a></b><br/>

doc/changelogs/CHANGELOG_V19.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88
</tr>
99
<tr>
1010
<td>
11+
<b><a href="#19.0.1">19.0.1</a></b><br/>
1112
<a href="#19.0.0">19.0.0</a><br/>
1213
</td>
1314
</tr>
@@ -34,6 +35,28 @@
3435
* [io.js](CHANGELOG_IOJS.md)
3536
* [Archive](CHANGELOG_ARCHIVE.md)
3637

38+
<a id="19.0.1"></a>
39+
40+
## 2022-11-04, Version 19.0.1 (Current), @RafaelGSS
41+
42+
This is a security release.
43+
44+
### Notable changes
45+
46+
The following CVEs are fixed in this release:
47+
48+
* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High)
49+
* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High)
50+
* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium)
51+
52+
More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post.
53+
54+
### Commits
55+
56+
* \[[`e58e8d70a8`](https://github.com/nodejs/node/commit/e58e8d70a8)] - **deps**: update archs files for quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286)
57+
* \[[`85f4548d57`](https://github.com/nodejs/node/commit/85f4548d57)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286)
58+
* \[[`43403f56f7`](https://github.com/nodejs/node/commit/43403f56f7)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354)
59+
3760
<a id="19.0.0"></a>
3861

3962
## 2022-10-18, Version 19.0.0 (Current), @RafaelGSS and @ruyadorno

src/node_version.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
#define NODE_VERSION_IS_LTS 0
3030
#define NODE_VERSION_LTS_CODENAME ""
3131

32-
#define NODE_VERSION_IS_RELEASE 0
32+
#define NODE_VERSION_IS_RELEASE 1
3333

3434
#ifndef NODE_STRINGIFY
3535
#define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n)

0 commit comments

Comments
 (0)