Skip to content

Commit 783e1e2

Browse files
committed
2019-02-28, Version 8.15.1 'Carbon' (LTS)
This is a security release. All Node.js users should consult the security release summary at: https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/ for details on patched vulnerabilities. Fixes for the following CVEs are included in this release: * Node.js: Slowloris HTTP Denial of Service with keep-alive (CVE-2019-5737) * OpenSSL: 0-byte record padding oracle (CVE-2019-1559) Notable Changes: * deps: OpenSSL has been upgraded to 1.0.2r which contains a fix for CVE-2019-1559 (https://www.openssl.org/news/secadv/20190226.txt). Under certain circumstances, a TLS server can be forced to respond differently to a client if a zero-byte record is received with an invalid padding compared to a zero-byte record with an invalid MAC. This can be used as the basis of a padding oracle attack to decrypt data. * http: Further prevention of "Slowloris" attacks on HTTP and HTTPS connections by consistently applying the receive timeout set by `server.headersTimeout` to connections in keep-alive mode. Reported by Marco Pracucci (https://voxnest.com). (CVE-2019-5737 / Matteo Collina) PR-URL: nodejs-private/node-private#165
1 parent 61980dc commit 783e1e2

File tree

3 files changed

+33
-2
lines changed

3 files changed

+33
-2
lines changed

CHANGELOG.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,8 @@ release.
2727
</tr>
2828
<tr>
2929
<td valign="top">
30-
<b><a href="doc/changelogs/CHANGELOG_V8.md#8.15.0">8.15.0</a></b><br/>
30+
<b><a href="doc/changelogs/CHANGELOG_V8.md#8.15.1">8.15.1</a></b><br/>
31+
<a href="doc/changelogs/CHANGELOG_V8.md#8.15.0">8.15.0</a><br/>
3132
<a href="doc/changelogs/CHANGELOG_V8.md#8.14.1">8.14.1</a><br/>
3233
<a href="doc/changelogs/CHANGELOG_V8.md#8.14.0">8.14.0</a><br/>
3334
<a href="doc/changelogs/CHANGELOG_V8.md#8.13.0">8.13.0</a><br/>

doc/changelogs/CHANGELOG_V8.md

+30
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
</tr>
1111
<tr>
1212
<td valign="top">
13+
<a href="#8.15.1">8.15.1</a><br/>
1314
<a href="#8.15.0">8.15.0</a><br/>
1415
<a href="#8.14.1">8.14.1</a><br/>
1516
<a href="#8.14.0">8.14.0</a><br/>
@@ -61,6 +62,35 @@
6162
[Node.js Long Term Support Plan](https://github.com/nodejs/LTS) and
6263
will be supported actively until April 2019 and maintained until December 2019.
6364

65+
<a id="8.15.1"></a>
66+
## 2019-02-28, Version 8.15.1 'Carbon' (LTS), @rvagg
67+
68+
This is a security release. All Node.js users should consult the security release summary at:
69+
70+
https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/
71+
72+
for details on patched vulnerabilities.
73+
74+
Fixes for the following CVEs are included in this release:
75+
76+
* Node.js: Slowloris HTTP Denial of Service with keep-alive (CVE-2019-5737)
77+
* OpenSSL: 0-byte record padding oracle (CVE-2019-1559)
78+
79+
### Notable Changes
80+
81+
* **deps**: OpenSSL has been upgraded to 1.0.2r which contains a fix for [CVE-2019-1559](https://www.openssl.org/news/secadv/20190226.txt). Under certain circumstances, a TLS server can be forced to respond differently to a client if a zero-byte record is received with an invalid _padding_ compared to a zero-byte record with an invalid _MAC_. This can be used as the basis of a padding oracle attack to decrypt data.
82+
* **http**: Further prevention of "Slowloris" attacks on HTTP and HTTPS connections by consistently applying the receive timeout set by `server.headersTimeout` to connections in keep-alive mode. Reported by Marco Pracucci ([Voxnest](https://voxnest.com)). (CVE-2019-5737 / Matteo Collina)
83+
84+
### Commits
85+
86+
* [[`61980dcbf9`](https://github.com/nodejs/node/commit/61980dcbf9)] - **deps**: add -no\_rand\_screen to openssl s\_client (Shigeki Ohtsu) [nodejs/io.js#1836](https://github.com/nodejs/io.js/pull/1836)
87+
* [[`bf287faf21`](https://github.com/nodejs/node/commit/bf287faf21)] - **deps**: fix asm build error of openssl in x86\_win32 (Shigeki Ohtsu) [iojs/io.js#1389](https://github.com/iojs/io.js/pull/1389)
88+
* [[`22ec5feff0`](https://github.com/nodejs/node/commit/22ec5feff0)] - **deps**: fix openssl assembly error on ia32 win32 (Fedor Indutny) [iojs/io.js#1389](https://github.com/iojs/io.js/pull/1389)
89+
* [[`2cc5e7f534`](https://github.com/nodejs/node/commit/2cc5e7f534)] - **deps**: copy all openssl header files to include dir (Shigeki Ohtsu)
90+
* [[`d71517fd43`](https://github.com/nodejs/node/commit/d71517fd43)] - **deps**: upgrade openssl sources to 1.0.2r (Shigeki Ohtsu)
91+
* [[`76d52c508a`](https://github.com/nodejs/node/commit/76d52c508a)] - **http**: prevent slowloris with keepalive connections (Matteo Collina) [nodejs-private/node-private#162](https://github.com/nodejs-private/node-private/pull/162)
92+
* [[`6969fad7d6`](https://github.com/nodejs/node/commit/6969fad7d6)] - **openssl**: fix keypress requirement in apps on win32 (Shigeki Ohtsu) [iojs/io.js#1389](https://github.com/iojs/io.js/pull/1389)
93+
6494
<a id="8.15.0"></a>
6595
## 2018-12-26, Version 8.15.0 'Carbon' (LTS), @MylesBorins
6696

src/node_version.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
#define NODE_VERSION_IS_LTS 1
3030
#define NODE_VERSION_LTS_CODENAME "Carbon"
3131

32-
#define NODE_VERSION_IS_RELEASE 0
32+
#define NODE_VERSION_IS_RELEASE 1
3333

3434
#ifndef NODE_STRINGIFY
3535
#define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n)

0 commit comments

Comments
 (0)