mirror of
https://github.com/nodejs/node.git
synced 2024-11-21 10:59:27 +00:00
2022-11-04, Version 18.12.1 'Hydrogen' (LTS)
This is a security release. Notable changes: The following CVEs are fixed in this release: - CVE-2022-3602: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-3786: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP address (Medium) PR-URL: https://github.com/nodejs-private/node-private/pull/365
This commit is contained in:
parent
9fb612e61c
commit
58e8a8c58e
@ -39,7 +39,8 @@ release.
|
||||
<a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a><br/>
|
||||
</td>
|
||||
<td valign="top">
|
||||
<b><a href="doc/changelogs/CHANGELOG_V18.md#18.12.0">18.12.0</a></b><br/>
|
||||
<b><a href="doc/changelogs/CHANGELOG_V18.md#18.12.1">18.12.1</a></b><br/>
|
||||
<a href="doc/changelogs/CHANGELOG_V18.md#18.12.0">18.12.0</a><br/>
|
||||
<a href="doc/changelogs/CHANGELOG_V18.md#18.11.0">18.11.0</a><br/>
|
||||
<a href="doc/changelogs/CHANGELOG_V18.md#18.10.0">18.10.0</a><br/>
|
||||
<a href="doc/changelogs/CHANGELOG_V18.md#18.9.1">18.9.1</a><br/>
|
||||
|
@ -9,6 +9,7 @@
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="#18.12.1">18.12.1</a><br/>
|
||||
<a href="#18.12.0">18.12.0</a><br/>
|
||||
</td>
|
||||
<td>
|
||||
@ -50,6 +51,28 @@
|
||||
* [io.js](CHANGELOG_IOJS.md)
|
||||
* [Archive](CHANGELOG_ARCHIVE.md)
|
||||
|
||||
<a id="18.12.1"></a>
|
||||
|
||||
## 2022-11-03, Version 18.12.1 'Hydrogen' (LTS), @juanarbol
|
||||
|
||||
This is a security release.
|
||||
|
||||
### Notable changes
|
||||
|
||||
The following CVEs are fixed in this release:
|
||||
|
||||
* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High)
|
||||
* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High)
|
||||
* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium)
|
||||
|
||||
More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post.
|
||||
|
||||
### Commits
|
||||
|
||||
* \[[`39f8a672e3`](https://github.com/nodejs/node/commit/39f8a672e3)] - **deps**: update archs files for quictls/openssl-3.0.7+quic [nodejs/node#45286](https://github.com/nodejs/node/pull/45286)
|
||||
* \[[`80218127c8`](https://github.com/nodejs/node/commit/80218127c8)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic [nodejs/node#45286](https://github.com/nodejs/node/pull/45286)
|
||||
* \[[`165342beac`](https://github.com/nodejs/node/commit/165342beac)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354)
|
||||
|
||||
<a id="18.12.0"></a>
|
||||
|
||||
## 2022-10-25, Version 18.12.0 'Hydrogen' (LTS), @ruyadorno and @RafaelGSS
|
||||
|
Loading…
Reference in New Issue
Block a user