diff options
author | Rod Vagg <rod@vagg.org> | 2016-09-28 01:48:59 +1000 |
---|---|---|
committer | Rod Vagg <rod@vagg.org> | 2016-09-28 10:42:18 +1000 |
commit | eba39c4bc6582477b3fe196a9cc959f176b90a52 (patch) | |
tree | 513f70ba584caed4eed6fff4ddffd2daa0be5558 /CHANGELOG.md | |
parent | e686be90bb18d108cd9aca37848a544566955ad4 (diff) | |
download | android-node-v8-eba39c4bc6582477b3fe196a9cc959f176b90a52.tar.gz android-node-v8-eba39c4bc6582477b3fe196a9cc959f176b90a52.tar.bz2 android-node-v8-eba39c4bc6582477b3fe196a9cc959f176b90a52.zip |
2016-09-27, Version 4.6.0 'Argon' (LTS)
This is a security release. All Node.js users should consult the
security release summary at
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
for details on patched vulnerabilities.
Notable Changes
Semver Minor:
* openssl:
- Upgrade to 1.0.2i, fixes a number of defects impacting Node.js:
CVE-2016-6304 ("OCSP Status Request extension unbounded memory
growth", high severity), CVE-2016-2183, CVE-2016-6303,
CVE-2016-2178 and CVE-2016-6306.
(Shigeki Ohtsu) https://github.com/nodejs/node/pull/8714
- Upgrade to 1.0.2j, fixes a defect included in 1.0.2i resulting in
a crash when using CRLs, CVE-2016-7052.
(Shigeki Ohtsu) https://github.com/nodejs/node/pull/8786
- Remove support for loading dynamic third-party engine modules.
An attacker may be able to hide malicious code to be inserted into
Node.js at runtime by masquerading as one of the dynamic engine
modules. Originally reported by Ahmed Zaki (Skype).
(Ben Noordhuis) https://github.com/nodejs/node-private/pull/70
* http: CVE-2016-5325 - Properly validate for allowable characters in
the `reason` argument in `ServerResponse#writeHead()`. Fixes a
possible response splitting attack vector. This introduces a new
case where `throw` may occur when configuring HTTP responses, users
should already be adopting try/catch here. Originally reported
independently by Evan Lucas and Romain Gaucher.
(Evan Lucas) https://github.com/nodejs/node-private/pull/46
Semver Patch:
* buffer: Zero-fill excess bytes in new `Buffer` objects created with
`Buffer.concat()` while providing a `totalLength` parameter that
exceeds the total length of the original `Buffer` objects being
concatenated.
(Сковорода Никита Андреевич) https://github.com/nodejs/node-private/pull/65
* tls: CVE-2016-7099 - Fix invalid wildcard certificate validation
check whereby a TLS server may be able to serve an invalid wildcard
certificate for its hostname due to improper validation of `*.` in
the wildcard string. Originally reported by Alexander Minozhenko and
James Bunton (Atlassian).
(Ben Noordhuis) https://github.com/nodejs/node-private/pull/63
PR-URL: https://github.com/nodejs/node-private/pull/74
Diffstat (limited to 'CHANGELOG.md')
-rw-r--r-- | CHANGELOG.md | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/CHANGELOG.md b/CHANGELOG.md index a52e597555..2278507d2f 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -58,7 +58,8 @@ release. <a href="doc/changelogs/CHANGELOG_V5.md#5.0.0">5.0.0</a><br/> </td> <td valign="top"> -<b><a href="doc/changelogs/CHANGELOG_V4.md#4.5.0">4.5.0</a></b><br/> +<b><a href="doc/changelogs/CHANGELOG_V4.md#4.6.0">4.6.0</a></b><br/> +<a href="doc/changelogs/CHANGELOG_V4.md#4.5.0">4.5.0</a><br/> <a href="doc/changelogs/CHANGELOG_V4.md#4.4.7">4.4.7</a></b> <a href="doc/changelogs/CHANGELOG_V4.md#4.4.6">4.4.6</a></b> <a href="doc/changelogs/CHANGELOG_V4.md#4.4.5">4.4.5</a></b> |