Skip to content

Commit b53c519

Browse files
committed
2023-06-20, Version 16.20.1 'Gallium' (LTS)
This is a security release. Notable changes: Following CVEs are fixed in this release: * CVE-2023-30581: `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) * CVE-2023-30585: Privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (Medium) * CVE-2023-30588: Process interuption due to invalid Public Key information in x509 certificates (Medium) * CVE-2023-30589: HTTP Request Smuggling via Empty headers separated by CR (Medium) * CVE-2023-30590: DiffieHellman does not generate keys after setting a private key (Medium) * OpenSSL Security Releases * https://www.openssl.org/news/secadv/20230328.txt * https://www.openssl.org/news/secadv/20230420.txt * https://www.openssl.org/news/secadv/20230530.txt * c-ares vulnerabilities: * GHSA-9g78-jv2r-p7vc * GHSA-8r8p-23f3-64c2 * GHSA-54xr-f67r-4pc4 * GHSA-x6mf-cxr9-8q6v PR-URL: nodejs-private/node-private#432
1 parent 1004268 commit b53c519

File tree

3 files changed

+44
-2
lines changed

3 files changed

+44
-2
lines changed

CHANGELOG.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,8 @@ release.
3232
</tr>
3333
<tr>
3434
<td valign="top">
35-
<b><a href="doc/changelogs/CHANGELOG_V16.md#16.20.0">16.20.0</a></b><br/>
35+
<b><a href="doc/changelogs/CHANGELOG_V16.md#16.20.1">16.20.1</a></b><br/>
36+
<a href="doc/changelogs/CHANGELOG_V16.md#16.20.0">16.20.0</a><br/>
3637
<a href="doc/changelogs/CHANGELOG_V16.md#16.19.1">16.19.1</a><br/>
3738
<a href="doc/changelogs/CHANGELOG_V16.md#16.19.0">16.19.0</a><br/>
3839
<a href="doc/changelogs/CHANGELOG_V16.md#16.18.1">16.18.1</a><br/>

doc/changelogs/CHANGELOG_V16.md

+41
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
</tr>
1010
<tr>
1111
<td valign="top">
12+
<a href="#16.20.1">16.20.1</a><br/>
1213
<a href="#16.20.0">16.20.0</a><br/>
1314
<a href="#16.19.1">16.19.1</a><br/>
1415
<a href="#16.19.0">16.19.0</a><br/>
@@ -69,6 +70,46 @@
6970
* [io.js](CHANGELOG_IOJS.md)
7071
* [Archive](CHANGELOG_ARCHIVE.md)
7172

73+
<a id="16.20.1"></a>
74+
75+
## 2023-06-20, Version 16.20.1 'Gallium' (LTS), @RafaelGSS
76+
77+
This is a security release.
78+
79+
### Notable Changes
80+
81+
The following CVEs are fixed in this release:
82+
83+
* [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High)
84+
* [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585): Privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (Medium)
85+
* [CVE-2023-30588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30588): Process interuption due to invalid Public Key information in x509 certificates (Medium)
86+
* [CVE-2023-30589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30589): HTTP Request Smuggling via Empty headers separated by CR (Medium)
87+
* [CVE-2023-30590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30590): DiffieHellman does not generate keys after setting a private key (Medium)
88+
* OpenSSL Security Releases
89+
* [OpenSSL security advisory 28th March](https://www.openssl.org/news/secadv/20230328.txt).
90+
* [OpenSSL security advisory 20th April](https://www.openssl.org/news/secadv/20230420.txt).
91+
* [OpenSSL security advisory 30th May](https://www.openssl.org/news/secadv/20230530.txt)
92+
* c-ares vulnerabilities:
93+
* [GHSA-9g78-jv2r-p7vc](https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc)
94+
* [GHSA-8r8p-23f3-64c2](https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2)
95+
* [GHSA-54xr-f67r-4pc4](https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4)
96+
* [GHSA-x6mf-cxr9-8q6v](https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v)
97+
98+
More detailed information on each of the vulnerabilities can be found in [June 2023 Security Releases](https://nodejs.org/en/blog/vulnerability/june-2023-security-releases/) blog post.
99+
100+
### Commits
101+
102+
* \[[`5a92ea7a3b`](https://github.com/nodejs/node/commit/5a92ea7a3b)] - **crypto**: handle cert with invalid SPKI gracefully (Tobias Nießen)
103+
* \[[`5df04e893a`](https://github.com/nodejs/node/commit/5df04e893a)] - **deps**: set `CARES_RANDOM_FILE` for c-ares (Richard Lau) [#48156](https://github.com/nodejs/node/pull/48156)
104+
* \[[`c171cbd124`](https://github.com/nodejs/node/commit/c171cbd124)] - **deps**: update c-ares to 1.19.1 (RafaelGSS) [#48115](https://github.com/nodejs/node/pull/48115)
105+
* \[[`155d3aac02`](https://github.com/nodejs/node/commit/155d3aac02)] - **deps**: update archs files for OpenSSL-1.1.1u+quic (RafaelGSS) [#48369](https://github.com/nodejs/node/pull/48369)
106+
* \[[`8d4c8f8ebe`](https://github.com/nodejs/node/commit/8d4c8f8ebe)] - **deps**: upgrade openssl sources to OpenSSL\_1\_1\_1u (RafaelGSS) [#48369](https://github.com/nodejs/node/pull/48369)
107+
* \[[`1a5c9284eb`](https://github.com/nodejs/node/commit/1a5c9284eb)] - **doc,test**: clarify behavior of DH generateKeys (Tobias Nießen) [nodejs-private/node-private#426](https://github.com/nodejs-private/node-private/pull/426)
108+
* \[[`e42ff4b018`](https://github.com/nodejs/node/commit/e42ff4b018)] - **http**: disable request smuggling via empty headers (Paolo Insogna) [nodejs-private/node-private#429](https://github.com/nodejs-private/node-private/pull/429)
109+
* \[[`10042683c8`](https://github.com/nodejs/node/commit/10042683c8)] - **msi**: do not create AppData\Roaming\npm (Tobias Nießen) [nodejs-private/node-private#408](https://github.com/nodejs-private/node-private/pull/408)
110+
* \[[`a6f4e87bc9`](https://github.com/nodejs/node/commit/a6f4e87bc9)] - **policy**: handle mainModule.\_\_proto\_\_ bypass (RafaelGSS) [nodejs-private/node-private#416](https://github.com/nodejs-private/node-private/pull/416)
111+
* \[[`b77000f4d7`](https://github.com/nodejs/node/commit/b77000f4d7)] - **test**: allow SIGBUS in signal-handler abort test (Michaël Zasso) [#47851](https://github.com/nodejs/node/pull/47851)
112+
72113
<a id="16.20.0"></a>
73114

74115
## 2023-03-29, Version 16.20.0 'Gallium' (LTS), @BethGriggs

src/node_version.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
#define NODE_VERSION_IS_LTS 1
3030
#define NODE_VERSION_LTS_CODENAME "Gallium"
3131

32-
#define NODE_VERSION_IS_RELEASE 0
32+
#define NODE_VERSION_IS_RELEASE 1
3333

3434
#ifndef NODE_STRINGIFY
3535
#define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n)

0 commit comments

Comments
 (0)