|
9 | 9 | </tr>
|
10 | 10 | <tr>
|
11 | 11 | <td>
|
| 12 | +<a href="#18.16.1">18.16.1</a><br/> |
12 | 13 | <a href="#18.16.0">18.16.0</a><br/>
|
13 | 14 | <a href="#18.15.0">18.15.0</a><br/>
|
14 | 15 | <a href="#18.14.2">18.14.2</a><br/>
|
|
58 | 59 | * [io.js](CHANGELOG_IOJS.md)
|
59 | 60 | * [Archive](CHANGELOG_ARCHIVE.md)
|
60 | 61 |
|
| 62 | +<a id="18.16.1"></a> |
| 63 | + |
| 64 | +## 2023-06-20, Version 18.16.1 'Hydrogen' (LTS), @RafaelGSS |
| 65 | + |
| 66 | +This is a security release. |
| 67 | + |
| 68 | +### Notable Changes |
| 69 | + |
| 70 | +The following CVEs are fixed in this release: |
| 71 | + |
| 72 | +* [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) |
| 73 | +* [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585): Privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (Medium) |
| 74 | +* [CVE-2023-30588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30588): Process interuption due to invalid Public Key information in x509 certificates (Medium) |
| 75 | +* [CVE-2023-30589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30589): HTTP Request Smuggling via Empty headers separated by CR (Medium) |
| 76 | +* [CVE-2023-30590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30590): DiffieHellman does not generate keys after setting a private key (Medium) |
| 77 | +* OpenSSL Security Releases |
| 78 | + * [OpenSSL security advisory 28th March](https://www.openssl.org/news/secadv/20230328.txt). |
| 79 | + * [OpenSSL security advisory 20th April](https://www.openssl.org/news/secadv/20230420.txt). |
| 80 | + * [OpenSSL security advisory 30th May](https://www.openssl.org/news/secadv/20230530.txt) |
| 81 | +* c-ares vulnerabilities: |
| 82 | + * [GHSA-9g78-jv2r-p7vc](https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc) |
| 83 | + * [GHSA-8r8p-23f3-64c2](https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2) |
| 84 | + * [GHSA-54xr-f67r-4pc4](https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4) |
| 85 | + * [GHSA-x6mf-cxr9-8q6v](https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v) |
| 86 | + |
| 87 | +More detailed information on each of the vulnerabilities can be found in [June 2023 Security Releases](https://nodejs.org/en/blog/vulnerability/june-2023-security-releases/) blog post. |
| 88 | + |
| 89 | +### Commits |
| 90 | + |
| 91 | +* \[[`bf3e2c8928`](https://github.com/nodejs/node/commit/bf3e2c8928)] - **crypto**: handle cert with invalid SPKI gracefully (Tobias Nießen) [nodejs-private/node-private#393](https://github.com/nodejs-private/node-private/pull/393) |
| 92 | +* \[[`70f9449072`](https://github.com/nodejs/node/commit/70f9449072)] - **deps**: set `CARES_RANDOM_FILE` for c-ares (Richard Lau) [#48156](https://github.com/nodejs/node/pull/48156) |
| 93 | +* \[[`35d4efb57b`](https://github.com/nodejs/node/commit/35d4efb57b)] - **deps**: update c-ares to 1.19.1 (RafaelGSS) [#48115](https://github.com/nodejs/node/pull/48115) |
| 94 | +* \[[`392dfedc77`](https://github.com/nodejs/node/commit/392dfedc77)] - **deps**: update archs files for openssl-3.0.9-quic1 (Node.js GitHub Bot) [#48402](https://github.com/nodejs/node/pull/48402) |
| 95 | +* \[[`46cd5fe38b`](https://github.com/nodejs/node/commit/46cd5fe38b)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.9-quic1 (Node.js GitHub Bot) [#48402](https://github.com/nodejs/node/pull/48402) |
| 96 | +* \[[`7e3d2d85c2`](https://github.com/nodejs/node/commit/7e3d2d85c2)] - **doc,test**: clarify behavior of DH generateKeys (Tobias Nießen) [nodejs-private/node-private#426](https://github.com/nodejs-private/node-private/pull/426) |
| 97 | +* \[[`4ff6ba050a`](https://github.com/nodejs/node/commit/4ff6ba050a)] - **http**: disable request smuggling via rempty headers (Paolo Insogna) [nodejs-private/node-private#428](https://github.com/nodejs-private/node-private/pull/428) |
| 98 | +* \[[`ab269129a6`](https://github.com/nodejs/node/commit/ab269129a6)] - **msi**: do not create AppData\Roaming\npm (Tobias Nießen) [nodejs-private/node-private#408](https://github.com/nodejs-private/node-private/pull/408) |
| 99 | +* \[[`925e8f5619`](https://github.com/nodejs/node/commit/925e8f5619)] - **policy**: handle mainModule.\_\_proto\_\_ bypass (RafaelGSS) [nodejs-private/node-private#416](https://github.com/nodejs-private/node-private/pull/416) |
| 100 | +* \[[`d6fae8e47e`](https://github.com/nodejs/node/commit/d6fae8e47e)] - **test**: allow SIGBUS in signal-handler abort test (Michaël Zasso) [#47851](https://github.com/nodejs/node/pull/47851) |
| 101 | + |
61 | 102 | <a id="18.16.0"></a>
|
62 | 103 |
|
63 | 104 | ## 2023-04-12, Version 18.16.0 'Hydrogen' (LTS), @danielleadams
|
|
0 commit comments