Skip to content

Commit 5405aa5

Browse files
marco-ippolitoRafaelGSS
authored andcommitted
2024-02-14, Version 20.11.1 'Iron' (LTS)
This is a security release. Notable changes: crypto: * disable PKCS#1 padding for privateDecrypt (Michael Dawson) nodejs-private/node-private#525 deps: * upgrade libuv to 1.48.0 (Santiago Gimeno) #51699 * update archs files for openssl-3.0.13+quic1 (Node.js GitHub Bot) #51614 * upgrade openssl sources to quictls/openssl-3.0.13+quic1 (Node.js GitHub Bot) #51614 * disable io\_uring support in libuv by default (Tobias Nießen) nodejs-private/node-private#529 * fix GHSA-f74f-cvh7-c6q6/CVE-2024-24806 (Santiago Gimeno) #51737 fs: * protect against modified Buffer internals in possiblyTransformPath (Tobias Nießen) nodejs-private/node-private#49 http: * add maximum chunk extension size (Paolo Insogna) nodejs-private/node-private#519 lib: * update undici to v5.28.3 (Matteo Collina) nodejs-private/node-private#539 * use cache fs internals against path traversal (RafaelGSS) nodejs-private/node-private#516 src: * fix HasOnly(capability) in node::credentials (Tobias Nießen) nodejs-private/node-private#505 src,deps: * disable setuid() etc if io\_uring enabled (Tobias Nießen) nodejs-private/node-private#529 test,doc: * clarify wildcard usage (RafaelGSS) nodejs-private/node-private#517 zlib: * pause stream if outgoing buffer is full (Matteo Collina) nodejs-private/node-private#541 PR-URL: nodejs-private/node-private#544
1 parent 2a5a150 commit 5405aa5

File tree

3 files changed

+45
-2
lines changed

3 files changed

+45
-2
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@ release.
4646
<a href="doc/changelogs/CHANGELOG_V21.md#21.0.0">21.0.0</a><br/>
4747
</td>
4848
<td valign="top">
49-
<b><a href="doc/changelogs/CHANGELOG_V20.md#20.11.0">20.11.0</a></b><br/>
49+
<b><a href="doc/changelogs/CHANGELOG_V20.md#20.11.1">20.11.1</a></b><br/>
50+
<a href="doc/changelogs/CHANGELOG_V20.md#20.11.0">20.11.0</a><br/>
5051
<a href="doc/changelogs/CHANGELOG_V20.md#20.10.0">20.10.0</a><br/>
5152
<a href="doc/changelogs/CHANGELOG_V20.md#20.9.0">20.9.0</a><br/>
5253
<a href="doc/changelogs/CHANGELOG_V20.md#20.8.1">20.8.1</a><br/>

doc/api/errors.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3174,7 +3174,9 @@ an `Error` with this code will be emitted.
31743174
### `HPE_CHUNK_EXTENSIONS_OVERFLOW`
31753175

31763176
<!-- YAML
3177-
added: v18.19.1
3177+
added:
3178+
- v20.11.1
3179+
- v18.19.1
31783180
-->
31793181

31803182
Too much data was received for a chunk extensions. In order to protect against

doc/changelogs/CHANGELOG_V20.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
</tr>
1010
<tr>
1111
<td>
12+
<a href="#20.11.1">20.11.1</a><br/>
1213
<a href="#20.11.0">20.11.0</a><br/>
1314
<a href="#20.10.0">20.10.0</a><br/>
1415
<a href="#20.9.0">20.9.0</a><br/>
@@ -54,6 +55,45 @@
5455
* [io.js](CHANGELOG_IOJS.md)
5556
* [Archive](CHANGELOG_ARCHIVE.md)
5657

58+
<a id="20.11.1"></a>
59+
60+
## 2024-02-14, Version 20.11.1 'Iron' (LTS), @RafaelGSS prepared by @marco-ippolito
61+
62+
### Notable changes
63+
64+
This is a security release.
65+
66+
### Notable changes
67+
68+
* CVE-2024-21892 - Code injection and privilege escalation through Linux capabilities- (High)
69+
* CVE-2024-22019 - http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks- (High)
70+
* CVE-2024-21896 - Path traversal by monkey-patching Buffer internals- (High)
71+
* CVE-2024-22017 - setuid() does not drop all privileges due to io\_uring - (High)
72+
* CVE-2023-46809 - Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) - (Medium)
73+
* CVE-2024-21891 - Multiple permission model bypasses due to improper path traversal sequence sanitization - (Medium)
74+
* CVE-2024-21890 - Improper handling of wildcards in --allow-fs-read and --allow-fs-write (Medium)
75+
* CVE-2024-22025 - Denial of Service by resource exhaustion in fetch() brotli decoding - (Medium)
76+
* undici version 5.28.3
77+
* libuv version 1.48.0
78+
* OpenSSL version 3.0.13+quic1
79+
80+
### Commits
81+
82+
* \[[`7079c062bb`](https://github.com/nodejs/node/commit/7079c062bb)] - **crypto**: disable PKCS#1 padding for privateDecrypt (Michael Dawson) [nodejs-private/node-private#525](https://github.com/nodejs-private/node-private/pull/525)
83+
* \[[`186a6e1ffb`](https://github.com/nodejs/node/commit/186a6e1ffb)] - **deps**: fix GHSA-f74f-cvh7-c6q6/CVE-2024-24806 (Santiago Gimeno) [#51737](https://github.com/nodejs/node/pull/51737)
84+
* \[[`686da19abb`](https://github.com/nodejs/node/commit/686da19abb)] - **deps**: disable io\_uring support in libuv by default (Tobias Nießen) [nodejs-private/node-private#529](https://github.com/nodejs-private/node-private/pull/529)
85+
* \[[`f7b44bfbce`](https://github.com/nodejs/node/commit/f7b44bfbce)] - **deps**: update archs files for openssl-3.0.13+quic1 (Node.js GitHub Bot) [#51614](https://github.com/nodejs/node/pull/51614)
86+
* \[[`7a30fecea2`](https://github.com/nodejs/node/commit/7a30fecea2)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.13+quic1 (Node.js GitHub Bot) [#51614](https://github.com/nodejs/node/pull/51614)
87+
* \[[`480fc169a8`](https://github.com/nodejs/node/commit/480fc169a8)] - **fs**: protect against modified Buffer internals in possiblyTransformPath (Tobias Nießen) [nodejs-private/node-private#497](https://github.com/nodejs-private/node-private/pull/497)
88+
* \[[`77ac7c3153`](https://github.com/nodejs/node/commit/77ac7c3153)] - **http**: add maximum chunk extension size (Paolo Insogna) [nodejs-private/node-private#519](https://github.com/nodejs-private/node-private/pull/519)
89+
* \[[`ed7d149675`](https://github.com/nodejs/node/commit/ed7d149675)] - **lib**: use cache fs internals against path traversal (RafaelGSS) [nodejs-private/node-private#516](https://github.com/nodejs-private/node-private/pull/516)
90+
* \[[`89bd5fc38f`](https://github.com/nodejs/node/commit/89bd5fc38f)] - **lib**: update undici to v5.28.3 (Matteo Collina) [nodejs-private/node-private#539](https://github.com/nodejs-private/node-private/pull/539)
91+
* \[[`d01dd4291d`](https://github.com/nodejs/node/commit/d01dd4291d)] - **permission**: fix wildcard when children > 1 (Rafael Gonzaga) [#51209](https://github.com/nodejs/node/pull/51209)
92+
* \[[`40ff37dfcc`](https://github.com/nodejs/node/commit/40ff37dfcc)] - **src**: fix HasOnly(capability) in node::credentials (Tobias Nießen) [nodejs-private/node-private#505](https://github.com/nodejs-private/node-private/pull/505)
93+
* \[[`3f6addd590`](https://github.com/nodejs/node/commit/3f6addd590)] - **src,deps**: disable setuid() etc if io\_uring enabled (Tobias Nießen) [nodejs-private/node-private#529](https://github.com/nodejs-private/node-private/pull/529)
94+
* \[[`d6da413aa4`](https://github.com/nodejs/node/commit/d6da413aa4)] - **test,doc**: clarify wildcard usage (RafaelGSS) [nodejs-private/node-private#517](https://github.com/nodejs-private/node-private/pull/517)
95+
* \[[`c213910aea`](https://github.com/nodejs/node/commit/c213910aea)] - **zlib**: pause stream if outgoing buffer is full (Matteo Collina) [nodejs-private/node-private#541](https://github.com/nodejs-private/node-private/pull/541)
96+
5797
<a id="20.11.0"></a>
5898

5999
## 2024-01-09, Version 20.11.0 'Iron' (LTS), @UlisesGascon

0 commit comments

Comments
 (0)