|
8 | 8 | </tr>
|
9 | 9 | <tr>
|
10 | 10 | <td>
|
| 11 | +<a href="#20.5.1">20.5.1</a><br/> |
11 | 12 | <a href="#20.5.0">20.5.0</a><br/>
|
12 | 13 | <a href="#20.4.0">20.4.0</a><br/>
|
13 | 14 | <a href="#20.3.1">20.3.1</a><br/>
|
|
41 | 42 | * [io.js](CHANGELOG_IOJS.md)
|
42 | 43 | * [Archive](CHANGELOG_ARCHIVE.md)
|
43 | 44 |
|
| 45 | +<a id="20.5.1"></a> |
| 46 | + |
| 47 | +## 2023-08-09, Version 20.5.1 (Current), @RafaelGSS |
| 48 | + |
| 49 | +This is a security release. |
| 50 | + |
| 51 | +### Notable Changes |
| 52 | + |
| 53 | +The following CVEs are fixed in this release: |
| 54 | + |
| 55 | +* [CVE-2023-32002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32002): Policies can be bypassed via Module.\_load (High) |
| 56 | +* [CVE-2023-32558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32558): process.binding() can bypass the permission model through path traversal (High) |
| 57 | +* [CVE-2023-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32004): Permission model can be bypassed by specifying a path traversal sequence in a Buffer (High) |
| 58 | +* [CVE-2023-32006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32006): Policies can be bypassed by module.constructor.createRequire (Medium) |
| 59 | +* [CVE-2023-32559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559): Policies can be bypassed via process.binding (Medium) |
| 60 | +* [CVE-2023-32005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32005): fs.statfs can bypass the permission model (Low) |
| 61 | +* [CVE-2023-32003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32003): fs.mkdtemp() and fs.mkdtempSync() can bypass the permission model (Low) |
| 62 | +* OpenSSL Security Releases |
| 63 | + * [OpenSSL security advisory 14th July](https://mta.openssl.org/pipermail/openssl-announce/2023-July/000264.html). |
| 64 | + * [OpenSSL security advisory 19th July](https://mta.openssl.org/pipermail/openssl-announce/2023-July/000265.html). |
| 65 | + * [OpenSSL security advisory 31st July](https://mta.openssl.org/pipermail/openssl-announce/2023-July/000267.html) |
| 66 | + |
| 67 | +More detailed information on each of the vulnerabilities can be found in [August 2023 Security Releases](https://nodejs.org/en/blog/vulnerability/august-2023-security-releases/) blog post. |
| 68 | + |
| 69 | +### Commits |
| 70 | + |
| 71 | +* \[[`92300b51b4`](https://github.com/nodejs/node/commit/92300b51b4)] - **deps**: update archs files for openssl-3.0.10+quic1 (Node.js GitHub Bot) [#49036](https://github.com/nodejs/node/pull/49036) |
| 72 | +* \[[`559698abf2`](https://github.com/nodejs/node/commit/559698abf2)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.10+quic1 (Node.js GitHub Bot) [#49036](https://github.com/nodejs/node/pull/49036) |
| 73 | +* \[[`1bf3429e8e`](https://github.com/nodejs/node/commit/1bf3429e8e)] - **lib,permission**: restrict process.binding when pm is enabled (RafaelGSS) [nodejs-private/node-private#438](https://github.com/nodejs-private/node-private/pull/438) |
| 74 | +* \[[`98a83a67e6`](https://github.com/nodejs/node/commit/98a83a67e6)] - **permission**: ensure to resolve path when calling mkdtemp (RafaelGSS) [nodejs-private/node-private#464](https://github.com/nodejs-private/node-private/pull/464) |
| 75 | +* \[[`1f0cde466b`](https://github.com/nodejs/node/commit/1f0cde466b)] - **permission**: handle buffer path on fs calls (RafaelGSS) [nodejs-private/node-private#439](https://github.com/nodejs-private/node-private/pull/439) |
| 76 | +* \[[`bd094d60ea`](https://github.com/nodejs/node/commit/bd094d60ea)] - **permission**: handle fstatfs and add pm supported list (RafaelGSS) [nodejs-private/node-private#441](https://github.com/nodejs-private/node-private/pull/441) |
| 77 | +* \[[`7337d21484`](https://github.com/nodejs/node/commit/7337d21484)] - **policy**: handle Module.constructor and main.extensions bypass (RafaelGSS) [nodejs-private/node-private#417](https://github.com/nodejs-private/node-private/pull/417) |
| 78 | +* \[[`cf348ec640`](https://github.com/nodejs/node/commit/cf348ec640)] - **policy**: disable process.binding() when enabled (Tobias Nießen) [nodejs-private/node-private#397](https://github.com/nodejs-private/node-private/pull/397) |
| 79 | + |
44 | 80 | <a id="20.5.0"></a>
|
45 | 81 |
|
46 | 82 | ## 2023-07-18, Version 20.5.0 (Current), @juanarbol
|
|
0 commit comments