Skip to content

Commit 6ac3a22

Browse files
committed
2022-11-04, Version 19.0.1 (Current)
This is a security release. Notable changes: The following CVEs are fixed in this release: - CVE-2022-3786: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-3602: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP address (Medium) PR-URL: nodejs-private/node-private#366
1 parent e58e8d7 commit 6ac3a22

File tree

3 files changed

+26
-2
lines changed

3 files changed

+26
-2
lines changed

CHANGELOG.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,8 @@ release.
3737
</tr>
3838
<tr>
3939
<td valign="top">
40-
<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a></b><br/>
40+
<b><a href="doc/changelogs/CHANGELOG_V19.md#19.0.1">19.0.1</a></b><br/>
41+
<a href="doc/changelogs/CHANGELOG_V19.md#19.0.0">19.0.0</a><br/>
4142
</td>
4243
<td valign="top">
4344
<b><a href="doc/changelogs/CHANGELOG_V18.md#18.11.0">18.11.0</a></b><br/>

doc/changelogs/CHANGELOG_V19.md

+23
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88
</tr>
99
<tr>
1010
<td>
11+
<b><a href="#19.0.1">19.0.1</a></b><br/>
1112
<a href="#19.0.0">19.0.0</a><br/>
1213
</td>
1314
</tr>
@@ -34,6 +35,28 @@
3435
* [io.js](CHANGELOG_IOJS.md)
3536
* [Archive](CHANGELOG_ARCHIVE.md)
3637

38+
<a id="19.0.1"></a>
39+
40+
## 2022-11-04, Version 19.0.1 (Current), @RafaelGSS
41+
42+
This is a security release.
43+
44+
### Notable changes
45+
46+
The following CVEs are fixed in this release:
47+
48+
* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High)
49+
* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High)
50+
* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium)
51+
52+
More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post.
53+
54+
### Commits
55+
56+
* \[[`e58e8d70a8`](https://github.com/nodejs/node/commit/e58e8d70a8)] - **deps**: update archs files for quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286)
57+
* \[[`85f4548d57`](https://github.com/nodejs/node/commit/85f4548d57)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic (RafaelGSS) [#45286](https://github.com/nodejs/node/pull/45286)
58+
* \[[`43403f56f7`](https://github.com/nodejs/node/commit/43403f56f7)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354)
59+
3760
<a id="19.0.0"></a>
3861

3962
## 2022-10-18, Version 19.0.0 (Current), @RafaelGSS and @ruyadorno

src/node_version.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
#define NODE_VERSION_IS_LTS 0
3030
#define NODE_VERSION_LTS_CODENAME ""
3131

32-
#define NODE_VERSION_IS_RELEASE 0
32+
#define NODE_VERSION_IS_RELEASE 1
3333

3434
#ifndef NODE_STRINGIFY
3535
#define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n)

0 commit comments

Comments
 (0)