|
10 | 10 | </tr>
|
11 | 11 | <tr>
|
12 | 12 | <td valign="top">
|
| 13 | +<a href="#8.15.1">8.15.1</a><br/> |
13 | 14 | <a href="#8.15.0">8.15.0</a><br/>
|
14 | 15 | <a href="#8.14.1">8.14.1</a><br/>
|
15 | 16 | <a href="#8.14.0">8.14.0</a><br/>
|
|
61 | 62 | [Node.js Long Term Support Plan](https://github.com/nodejs/LTS) and
|
62 | 63 | will be supported actively until April 2019 and maintained until December 2019.
|
63 | 64 |
|
| 65 | +<a id="8.15.1"></a> |
| 66 | +## 2019-02-28, Version 8.15.1 'Carbon' (LTS), @rvagg |
| 67 | + |
| 68 | +This is a security release. All Node.js users should consult the security release summary at: |
| 69 | + |
| 70 | + https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/ |
| 71 | + |
| 72 | +for details on patched vulnerabilities. |
| 73 | + |
| 74 | +Fixes for the following CVEs are included in this release: |
| 75 | + |
| 76 | + * Node.js: Slowloris HTTP Denial of Service with keep-alive (CVE-2019-5737) |
| 77 | + * OpenSSL: 0-byte record padding oracle (CVE-2019-1559) |
| 78 | + |
| 79 | +### Notable Changes |
| 80 | + |
| 81 | +* **deps**: OpenSSL has been upgraded to 1.0.2r which contains a fix for [CVE-2019-1559](https://www.openssl.org/news/secadv/20190226.txt). Under certain circumstances, a TLS server can be forced to respond differently to a client if a zero-byte record is received with an invalid _padding_ compared to a zero-byte record with an invalid _MAC_. This can be used as the basis of a padding oracle attack to decrypt data. |
| 82 | +* **http**: Further prevention of "Slowloris" attacks on HTTP and HTTPS connections by consistently applying the receive timeout set by `server.headersTimeout` to connections in keep-alive mode. Reported by Marco Pracucci ([Voxnest](https://voxnest.com)). (CVE-2019-5737 / Matteo Collina) |
| 83 | + |
| 84 | +### Commits |
| 85 | + |
| 86 | +* [[`61980dcbf9`](https://github.com/nodejs/node/commit/61980dcbf9)] - **deps**: add -no\_rand\_screen to openssl s\_client (Shigeki Ohtsu) [nodejs/io.js#1836](https://github.com/nodejs/io.js/pull/1836) |
| 87 | +* [[`bf287faf21`](https://github.com/nodejs/node/commit/bf287faf21)] - **deps**: fix asm build error of openssl in x86\_win32 (Shigeki Ohtsu) [iojs/io.js#1389](https://github.com/iojs/io.js/pull/1389) |
| 88 | +* [[`22ec5feff0`](https://github.com/nodejs/node/commit/22ec5feff0)] - **deps**: fix openssl assembly error on ia32 win32 (Fedor Indutny) [iojs/io.js#1389](https://github.com/iojs/io.js/pull/1389) |
| 89 | +* [[`2cc5e7f534`](https://github.com/nodejs/node/commit/2cc5e7f534)] - **deps**: copy all openssl header files to include dir (Shigeki Ohtsu) |
| 90 | +* [[`d71517fd43`](https://github.com/nodejs/node/commit/d71517fd43)] - **deps**: upgrade openssl sources to 1.0.2r (Shigeki Ohtsu) |
| 91 | +* [[`76d52c508a`](https://github.com/nodejs/node/commit/76d52c508a)] - **http**: prevent slowloris with keepalive connections (Matteo Collina) [nodejs-private/node-private#162](https://github.com/nodejs-private/node-private/pull/162) |
| 92 | +* [[`6969fad7d6`](https://github.com/nodejs/node/commit/6969fad7d6)] - **openssl**: fix keypress requirement in apps on win32 (Shigeki Ohtsu) [iojs/io.js#1389](https://github.com/iojs/io.js/pull/1389) |
| 93 | + |
64 | 94 | <a id="8.15.0"></a>
|
65 | 95 | ## 2018-12-26, Version 8.15.0 'Carbon' (LTS), @MylesBorins
|
66 | 96 |
|
|
0 commit comments