-
Notifications
You must be signed in to change notification settings - Fork 31.3k
Comparing changes
Open a pull request
base repository: nodejs/node
base: v16.19.0
head repository: nodejs/node
compare: v16.19.1
- 14 commits
- 424 files changed
- 6 contributors
Commits on Dec 13, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 2d5d8f5 - Browse repository at this point
Copy the full SHA 2d5d8f5View commit details
Commits on Dec 21, 2022
-
doc: clarify release notes for Node.js 16.19.0
Refs: #45791 PR-URL: #45846 Refs: nodejs/nodejs.org#4972 Reviewed-By: Filip Skokan <panva.ip@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for 6937897 - Browse repository at this point
Copy the full SHA 6937897View commit details
Commits on Jan 22, 2023
-
test: avoid left behind child processes
Extend the Linux logic to all POSIX platforms in test-child-process-exec-abortcontroller-promisified. PR-URL: #46276 Fixes: nodejs/build#3154 Refs: #37518 Reviewed-By: Moshe Atlow <moshe@atlow.co.il> Reviewed-By: Beth Griggs <bethanyngriggs@gmail.com> Reviewed-By: Ruy Adorno <ruyadorno@google.com> Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: Luigi Pinca <luigipinca@gmail.com> Reviewed-By: Michaël Zasso <targos@protonmail.com> Reviewed-By: Michael Dawson <midawson@redhat.com> Reviewed-By: Rafael Gonzaga <rafael.nunu@hotmail.com> Reviewed-By: James M Snell <jasnell@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for d7f83c4 - Browse repository at this point
Copy the full SHA d7f83c4View commit details
Commits on Feb 13, 2023
-
deps: upgrade openssl sources to OpenSSL_1_1_1t+quic
This updates all sources in deps/openssl/openssl by: $ git clone https://github.com/quictls/openssl $ cd openssl $ git checkout OpenSSL_1_1_1t+quic $ cd ../node/deps/openssl $ rm -rf openssl $ cp -R ../openssl openssl $ rm -rf openssl/.git* openssl/.travis* $ git add --all openssl $ git commit openssl PR-URL: #46568 Refs: https://mta.openssl.org/pipermail/openssl-announce/2023-February/000251.html Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Beth Griggs <bethanyngriggs@gmail.com> Reviewed-By: Moshe Atlow <moshe@atlow.co.il>
Configuration menu - View commit details
-
Copy full SHA for 1a8ccfe - Browse repository at this point
Copy the full SHA 1a8ccfeView commit details -
deps: update archs files for quictls/openssl-1.1.1t+quic
After an OpenSSL source update, all the config files need to be regenerated and committed by: $ make -C deps/openssl/config $ git add deps/openssl/config/archs $ git add deps/openssl/openssl $ git commit PR-URL: #46568 Refs: https://mta.openssl.org/pipermail/openssl-announce/2023-February/000251.html Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Beth Griggs <bethanyngriggs@gmail.com> Reviewed-By: Moshe Atlow <moshe@atlow.co.il>
Configuration menu - View commit details
-
Copy full SHA for de5c8d2 - Browse repository at this point
Copy the full SHA de5c8d2View commit details -
deps: cherry-pick Windows ARM64 fix for openssl
Original commit message: rsa: add msvc intrinsic for non x64 platforms _umul128() is x86_64 (x64) only, while __umulh() works everywhere, but doesn't generate optimal code on x64 PR-URL: #46568 Refs: openssl/openssl#20244 Refs: https://mta.openssl.org/pipermail/openssl-announce/2023-February/000251.html Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Beth Griggs <bethanyngriggs@gmail.com> Reviewed-By: Moshe Atlow <moshe@atlow.co.il>
Configuration menu - View commit details
-
Copy full SHA for d80e831 - Browse repository at this point
Copy the full SHA d80e831View commit details
Commits on Feb 14, 2023
-
build: build ICU with ICU_NO_USER_DATA_OVERRIDE
Backport-PR-URL: nodejs-private/node-private#378 CVE-ID: CVE-2023-23920 PR-URL: nodejs-private/node-private#374 Refs: https://hackerone.com/bugs?subject=nodejs&report_id=1625036 Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Michael Dawson <midawson@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for 7fef050 - Browse repository at this point
Copy the full SHA 7fef050View commit details -
crypto: clear OpenSSL error queue after calling X509_verify()
Prior to this commit, functions accessing the OpenSSL error queue did not work properly after x509.verify() returned false. Backport-PR-URL: nodejs-private/node-private#375 CVE-ID: CVE-2023-23919 PR-URL: #45377 Refs: https://hackerone.com/bugs?subject=nodejs&report_id=1808596 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Tobias Nießen <tniessen@tnie.de> Reviewed-By: Filip Skokan <panva.ip@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for d0ece30 - Browse repository at this point
Copy the full SHA d0ece30View commit details -
crypto: clear OpenSSL error queue after calling X509_check_private_key()
Backport-PR-URL: nodejs-private/node-private#375 CVE-ID: CVE-2023-23919 Fixes: #45485 PR-URL: #45495 Refs: https://hackerone.com/bugs?subject=nodejs&report_id=1808596 Reviewed-By: Tobias Nießen <tniessen@tnie.de> Reviewed-By: Yagiz Nizipli <yagiz@nizipli.com>
Configuration menu - View commit details
-
Copy full SHA for 160adb7 - Browse repository at this point
Copy the full SHA 160adb7View commit details -
crypto: clear OpenSSL error on invalid ca cert
Signed-off-by: RafaelGSS <rafael.nunu@hotmail.com> CVE-ID: CVE-2023-23919 PR-URL: nodejs-private/node-private#375 Refs: https://hackerone.com/bugs?report_id=1808596 Reviewed-By: Robert Nagy <ronagy@icloud.com> Reviewed-By: Richard Lau <rlau@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for b558e9f - Browse repository at this point
Copy the full SHA b558e9fView commit details
Commits on Feb 15, 2023
-
deps: update undici to v5.19.1
Signed-off-by: Matteo Collina <hello@matteocollina.com> CVE-ID: CVE-2023-23936, CVE-2023-24807 PR-URL: nodejs-private/node-private#388 Refs: GHSA-5r9g-qh6m-jxff Refs: GHSA-r6ch-mqf9-qc9w Refs: https://hackerone.com/bugs?subject=nodejs&report_id=1820955 Refs: https://hackerone.com/bugs?subject=nodejs&report_id=1784449 Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Michael Dawson <midawson@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for 2d9ae4f - Browse repository at this point
Copy the full SHA 2d9ae4fView commit details -
policy: makeRequireFunction on mainModule.require
Co-authored-by: Bradley Farias <bradley.meck@gmail.com> Backport-PR-URL: nodejs-private/node-private#372 Refs: https://hackerone.com/bugs?subject=nodejs&report_id=1747642 CVE-ID: CVE-2023-23918 PR-URL: nodejs-private/node-private#358 Reviewed-by: Bradley Farias <bradley.meck@gmail.com> Reviewed-by: Michael Dawson <midawson@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for b02d895 - Browse repository at this point
Copy the full SHA b02d895View commit details -
lib: makeRequireFunction patch when experimental policy
Signed-off-by: RafaelGSS <rafael.nunu@hotmail.com> Backport-PR-URL: nodejs-private/node-private#372 Refs: https://hackerone.com/bugs?subject=nodejs&report_id=1747642 CVE-ID: CVE-2023-23918 PR-URL: nodejs-private/node-private#358 Reviewed-by: Bradley Farias <bradley.meck@gmail.com> Reviewed-by: Michael Dawson <midawson@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for f95ef06 - Browse repository at this point
Copy the full SHA f95ef06View commit details -
2023-02-16, Version 16.19.1 'Gallium' (LTS)
This is a security release. Notable changes: The following CVEs are fixed in this release: - CVE-2023-23918: Node.js Permissions policies can be bypassed via process.mainModule (High) - CVE-2023-23919: Node.js OpenSSL error handling issues in nodejs crypto library (Medium) - CVE-2023-23936: Fetch API in Node.js did not protect against CRLF injection in host headers (Medium) - CVE-2023-24807: Regular Expression Denial of Service in Headers in Node.js fetch API (Low) - CVE-2023-23920: Node.js insecure loading of ICU data through ICU_DATA environment variable (Low) Fixed by an update to undici: - CVE-2023-23936: Fetch API in Node.js did not protect against CRLF injection in host headers (Medium) See GHSA-5r9g-qh6m-jxff for more information. - CVE-2023-24807: Regular Expression Denial of Service in Headers in Node.js fetch API (Low) See GHSA-r6ch-mqf9-qc9w for more information. - OpenSSL 1.1.1t PR-URL: nodejs-private/node-private#390
Configuration menu - View commit details
-
Copy full SHA for 96a4559 - Browse repository at this point
Copy the full SHA 96a4559View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v16.19.0...v16.19.1