Commit graph

25 commits

Author SHA1 Message Date
adam
8ef9c57863 nodejs10: updated to 10.24.1
Version 10.24.1 'Dubnium' (LTS)

This is a security release.

Notable Changes

Vulerabilties fixed:

CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High)
This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt
Impacts:
All versions of the 15.x, 14.x, 12.x and 10.x releases lines

CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (High)
This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt
Impacts:
All versions of the 15.x, 14.x, 12.x and 10.x releases lines

CVE-2020-7774: npm upgrade - Update y18n to fix Prototype-Pollution (High)
This is a vulnerability in the y18n npm module which may be exploited by prototype pollution. You can read more about it in https://github.com/advisories/GHSA-c4w7-xm78-47vh
Impacts:
All versions of the 14.x, 12.x and 10.x releases lines
2021-04-07 06:19:21 +00:00
adam
1471ddfa3e nodejs10/12: switch to .tar.xz 2021-02-24 11:10:11 +00:00
adam
7113eceaa3 nodejs10: updated to 10.24.0
Version 10.24.0 'Dubnium' (LTS)

This is a security release.

Notable changes

Vulnerabilities fixed:

CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion
Affected Node.js versions are vulnerable to denial of service attacks when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
CVE-2021-22884: DNS rebinding in --inspect
Affected Node.js versions are vulnerable to denial of service attacks when the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
CVE-2021-23840: OpenSSL - Integer overflow in CipherUpdate
This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210216.txt
2021-02-24 11:04:35 +00:00
adam
a3e7e91915 nodejs10: updated to 10.23.3
Version 10.23.3 'Dubnium' (LTS)

Notable changes

The update to npm 6.14.11 has been relanded so that npm correctly reports its version.


Version 10.23.2 'Dubnium'

Notable changes

Release keys have been synchronized with the main branch.

deps:
upgrade npm to 6.14.11
2021-02-15 10:20:58 +00:00
adam
5d9567d49d nodejs10: updated to 10.23.1
Version 10.23.1 'Dubnium' (LTS)

Notable changes

This is a security release.

Vulnerabilities fixed:

CVE-2020-8265: use-after-free in TLSWrap (High) Affected Node.js versions are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits
CVE-2020-8287: HTTP Request Smuggling in nodejs Affected versions of Node.js allow two copies of a header field in a http request. For example, two Transfer-Encoding header fields. In this case Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling (https://cwe.mitre.org/data/definitions/444.html).
CVE-2020-1971: OpenSSL - EDIPARTYNAME NULL pointer de-reference (High) This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20201208.txt
2021-01-05 08:35:36 +00:00
adam
93e0536fab nodejs8, nodejs10: add PYTHON_VERSIONS_ACCEPTED 2020-12-16 07:29:36 +00:00
jperkin
08b6db4599 nodejs*: Fix builds with icu-68.1. 2020-11-14 09:54:22 +00:00
adam
122357d6e6 nodejs10: updated to 10.23.0
Version 10.23.0 'Dubnium' (LTS)

Notable changes

deps:
upgrade npm to 6.14.8

n-api:
create N-API version 7
expose napi_build_version variable

tools:
add debug entitlements for macOS 10.15+
2020-11-12 21:02:43 +00:00
ryoon
4675ccbc79 *: Recursive revbump from textproc/icu-68.1 2020-11-05 09:06:42 +00:00
adam
a444030e64 nodejs10: updated to 10.22.1
Version 10.22.1 'Dubnium' (LTS)

Notable changes
This is a security release.

Vulnerabilities fixed:
CVE-2020-8252: fs.realpath.native on may cause buffer overflow (Medium).

Version 10.22.0 'Dubnium' (LTS)

Notable changes
deps:
* upgrade npm to 6.14.6
* upgrade openssl sources to 1.1.1g
n-api:
* add napi_detach_arraybuffer
2020-10-02 12:23:53 +00:00
gutteridge
088cc5f256 nodejs/nodejs10/nodejs12: these now require nghttp2>=1.41.0
As of the last updates to each of these, made earlier this month, they
now require nghttp2>=1.41.0 to build. They expect
nghttp2_option_set_max_settings to be available.
2020-06-18 04:58:24 +00:00
adam
9da0146605 nodejs10: updated to 10.21.0
Version 10.21.0 'Dubnium' (LTS)

Notable changes

This is a security release.

Vulnerabilities fixed:

CVE-2020-8174: napi_get_value_string_*() allows various kinds of memory corruption (High).
CVE-2020-10531: ICU-20958 Prevent SEGV_MAPERR in append (High).
CVE-2020-11080: HTTP/2 Large Settings Frame DoS (Low).

Commits

- deps: fix OPENSSLDIR on Windows
- deps: backport ICU-20958 to fix CVE-2020-10531
- (SEMVER-MINOR) deps: update nghttp2 to 1.41.0
- (SEMVER-MINOR) http2: implement support for max settings entries
- napi: fix memory corruption vulnerability
2020-06-03 09:25:38 +00:00
adam
6bd0c30da6 Revbump for icu 2020-06-02 08:22:31 +00:00
rillig
6729997d3c lang/nodejs*: skip portability check for macOS installation scripts 2020-05-31 21:41:22 +00:00
joerg
44c92d519b Don't implicitly convert pointers to bool. 2020-05-30 20:44:39 +00:00
adam
7d4b705c63 revbump after boost update 2020-05-06 14:04:05 +00:00
adam
91b252f9bf nodejs10: updated to 10.20.1
Version 10.20.1 'Dubnium'

Notable changes

Due to release process failures, Node.js v10.20.0 shipped with source and header tarballs that did not properly match the final release commit that was used to build the binaries. We recommend that Node.js v10.20.0 not be used, particularly in any applications using native add-ons or where compiling Node.js from source is involved.

Node.js v10.20.1 is a clean release with the correct sources and is strongly recommended in place of v10.20.0.


Version 10.20.0 'Dubnium'

macOS package notarization and a change in builder configuration

The macOS binaries for this release, and future 10.x releases, are now being compiled on macOS 10.15

Notable changes
buffer: add {read|write}Big[U]Int64{BE|LE} methods
build: macOS package notarization

deps:
update npm to 6.14.3
upgrade openssl sources to 1.1.1e
upgrade to libuv 1.34.2

n-api:
add napi_get_all_property_names
add APIs for per-instance state management
define release 6
turn NAPI_CALL_INTO_MODULE into a function

tls:
expose keylog event on TLSSocket
support TLS min/max protocol defaults in CLI
url: handle quasi-WHATWG URLs in urlToOptions()
2020-04-17 07:58:54 +00:00
adam
24daafa112 Recursive revision bump after textproc/icu update 2020-04-12 08:27:48 +00:00
jperkin
19524e16da nodejs*: Unbreak builds, again, this time with comment. 2020-03-11 09:22:49 +00:00
adam
c6bbb4e69e nodejs: updated to 13.10.0
Version 13.10.0 (Current):

Notable Changes

async_hooks
- introduce async-context API
stream
- support passing generator functions into pipeline()
tls
- expose SSL_export_keying_material
vm
- implement vm.measureMemory() for per-context memory measurement
2020-03-04 18:59:39 +00:00
jperkin
2dfcdec6c1 nodejs*: Consolidate python27 requirement.
It's still required as of nodejs v13.
2020-02-18 23:06:05 +00:00
adam
59a852296c nodejs10: updated to 10.19.0
Version 10.19.0 'Dubnium' (LTS):

Notable changes

This is a security release.

Vulnerabilities fixed:

CVE-2019-15606: HTTP header values do not have trailing OWS trimmed.
CVE-2019-15605: HTTP request smuggling using malformed Transfer-Encoding header.
CVE-2019-15604: Remotely trigger an assertion on a TLS server with a malformed certificate string.

Also, HTTP parsing is more strict to be more secure. Since this may cause problems in interoperability with some non-conformant HTTP implementations, it is possible to disable the strict checks with the --insecure-http-parser command line flag, or the insecureHTTPParser http option. Using the insecure HTTP parser should be avoided.
2020-02-07 09:50:36 +00:00
adam
83e110c4e2 nodejs10: updated to 10.18.1
Version 10.18.1 'Dubnium':

Notable changes
http2: fix session memory accounting after pausing
n-api: correct bug in napi_get_last_error
tools: update tzdata to 2019c
2020-01-24 18:57:09 +00:00
adam
b3f29611eb nodejs10: updated to 10.18.0
Version 10.18.0 'Dubnium' (LTS)
Notable changes
deps: update npm to 6.13.4
2019-12-29 15:40:00 +00:00
adam
48c0cb6a3b nodejs: added version 12.13.1, removed version 6.14.3
Moved nodejs to nodejs10 - version 10.17.0

Version 12.13.1 'Erbium' (LTS):

Notable changes
Experimental support for building Node.js with Python 3 is improved.
ICU time zone data is updated to version 2019c. This fixes the date offset in Brazil.
2019-12-09 20:05:40 +00:00