|
9 | 9 | </tr>
|
10 | 10 | <tr>
|
11 | 11 | <td valign="top">
|
| 12 | +<a href="#16.20.1">16.20.1</a><br/> |
12 | 13 | <a href="#16.20.0">16.20.0</a><br/>
|
13 | 14 | <a href="#16.19.1">16.19.1</a><br/>
|
14 | 15 | <a href="#16.19.0">16.19.0</a><br/>
|
|
69 | 70 | * [io.js](CHANGELOG_IOJS.md)
|
70 | 71 | * [Archive](CHANGELOG_ARCHIVE.md)
|
71 | 72 |
|
| 73 | +<a id="16.20.1"></a> |
| 74 | + |
| 75 | +## 2023-06-20, Version 16.20.1 'Gallium' (LTS), @RafaelGSS |
| 76 | + |
| 77 | +This is a security release. |
| 78 | + |
| 79 | +### Notable Changes |
| 80 | + |
| 81 | +The following CVEs are fixed in this release: |
| 82 | + |
| 83 | +* [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) |
| 84 | +* [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585): Privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (Medium) |
| 85 | +* [CVE-2023-30588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30588): Process interuption due to invalid Public Key information in x509 certificates (Medium) |
| 86 | +* [CVE-2023-30589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30589): HTTP Request Smuggling via Empty headers separated by CR (Medium) |
| 87 | +* [CVE-2023-30590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30590): DiffieHellman does not generate keys after setting a private key (Medium) |
| 88 | +* OpenSSL Security Releases |
| 89 | + * [OpenSSL security advisory 28th March](https://www.openssl.org/news/secadv/20230328.txt). |
| 90 | + * [OpenSSL security advisory 20th April](https://www.openssl.org/news/secadv/20230420.txt). |
| 91 | + * [OpenSSL security advisory 30th May](https://www.openssl.org/news/secadv/20230530.txt) |
| 92 | +* c-ares vulnerabilities: |
| 93 | + * [GHSA-9g78-jv2r-p7vc](https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc) |
| 94 | + * [GHSA-8r8p-23f3-64c2](https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2) |
| 95 | + * [GHSA-54xr-f67r-4pc4](https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4) |
| 96 | + * [GHSA-x6mf-cxr9-8q6v](https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v) |
| 97 | + |
| 98 | +More detailed information on each of the vulnerabilities can be found in [June 2023 Security Releases](https://nodejs.org/en/blog/vulnerability/june-2023-security-releases/) blog post. |
| 99 | + |
| 100 | +### Commits |
| 101 | + |
| 102 | +* \[[`5a92ea7a3b`](https://github.com/nodejs/node/commit/5a92ea7a3b)] - **crypto**: handle cert with invalid SPKI gracefully (Tobias Nießen) |
| 103 | +* \[[`5df04e893a`](https://github.com/nodejs/node/commit/5df04e893a)] - **deps**: set `CARES_RANDOM_FILE` for c-ares (Richard Lau) [#48156](https://github.com/nodejs/node/pull/48156) |
| 104 | +* \[[`c171cbd124`](https://github.com/nodejs/node/commit/c171cbd124)] - **deps**: update c-ares to 1.19.1 (RafaelGSS) [#48115](https://github.com/nodejs/node/pull/48115) |
| 105 | +* \[[`155d3aac02`](https://github.com/nodejs/node/commit/155d3aac02)] - **deps**: update archs files for OpenSSL-1.1.1u+quic (RafaelGSS) [#48369](https://github.com/nodejs/node/pull/48369) |
| 106 | +* \[[`8d4c8f8ebe`](https://github.com/nodejs/node/commit/8d4c8f8ebe)] - **deps**: upgrade openssl sources to OpenSSL\_1\_1\_1u (RafaelGSS) [#48369](https://github.com/nodejs/node/pull/48369) |
| 107 | +* \[[`1a5c9284eb`](https://github.com/nodejs/node/commit/1a5c9284eb)] - **doc,test**: clarify behavior of DH generateKeys (Tobias Nießen) [nodejs-private/node-private#426](https://github.com/nodejs-private/node-private/pull/426) |
| 108 | +* \[[`e42ff4b018`](https://github.com/nodejs/node/commit/e42ff4b018)] - **http**: disable request smuggling via empty headers (Paolo Insogna) [nodejs-private/node-private#429](https://github.com/nodejs-private/node-private/pull/429) |
| 109 | +* \[[`10042683c8`](https://github.com/nodejs/node/commit/10042683c8)] - **msi**: do not create AppData\Roaming\npm (Tobias Nießen) [nodejs-private/node-private#408](https://github.com/nodejs-private/node-private/pull/408) |
| 110 | +* \[[`a6f4e87bc9`](https://github.com/nodejs/node/commit/a6f4e87bc9)] - **policy**: handle mainModule.\_\_proto\_\_ bypass (RafaelGSS) [nodejs-private/node-private#416](https://github.com/nodejs-private/node-private/pull/416) |
| 111 | +* \[[`b77000f4d7`](https://github.com/nodejs/node/commit/b77000f4d7)] - **test**: allow SIGBUS in signal-handler abort test (Michaël Zasso) [#47851](https://github.com/nodejs/node/pull/47851) |
| 112 | + |
72 | 113 | <a id="16.20.0"></a>
|
73 | 114 |
|
74 | 115 | ## 2023-03-29, Version 16.20.0 'Gallium' (LTS), @BethGriggs
|
|
0 commit comments