Skip to content

Commit 9ca57fa

Browse files
juanarbolRafaelGSS
authored andcommitted
2022-11-04, Version 18.12.1 'Hydrogen' (LTS)
This is a security release. Notable changes: The following CVEs are fixed in this release: - CVE-2022-3602: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-3786: A buffer overrun can be triggered in X.509 certificate verification (High) - CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP address (Medium) PR-URL: nodejs-private/node-private#365
1 parent 39f8a67 commit 9ca57fa

File tree

3 files changed

+26
-2
lines changed

3 files changed

+26
-2
lines changed

CHANGELOG.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,8 @@ release.
3535
</tr>
3636
<tr>
3737
<td valign="top">
38-
<b><a href="doc/changelogs/CHANGELOG_V18.md#18.12.0">18.12.0</a></b><br/>
38+
<b><a href="doc/changelogs/CHANGELOG_V18.md#18.12.1">18.12.1</a></b><br/>
39+
<a href="doc/changelogs/CHANGELOG_V18.md#18.12.0">18.12.0</a><br/>
3940
<a href="doc/changelogs/CHANGELOG_V18.md#18.11.0">18.11.0</a><br/>
4041
<a href="doc/changelogs/CHANGELOG_V18.md#18.10.0">18.10.0</a><br/>
4142
<a href="doc/changelogs/CHANGELOG_V18.md#18.9.1">18.9.1</a><br/>

doc/changelogs/CHANGELOG_V18.md

+23
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
</tr>
1010
<tr>
1111
<td>
12+
<a href="#18.12.1">18.12.1</a><br/>
1213
<a href="#18.12.0">18.12.0</a><br/>
1314
</td>
1415
<td>
@@ -49,6 +50,28 @@
4950
* [io.js](CHANGELOG_IOJS.md)
5051
* [Archive](CHANGELOG_ARCHIVE.md)
5152

53+
<a id="18.12.1"></a>
54+
55+
## 2022-11-03, Version 18.12.1 'Hydrogen' (LTS), @juanarbol
56+
57+
This is a security release.
58+
59+
### Notable changes
60+
61+
The following CVEs are fixed in this release:
62+
63+
* **[CVE-2022-3602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602)**: X.509 Email Address 4-byte Buffer Overflow (High)
64+
* **[CVE-2022-3786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786)**: X.509 Email Address Variable Length Buffer Overflow (High)
65+
* **[CVE-2022-43548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548)**: DNS rebinding in --inspect via invalid octal IP address (Medium)
66+
67+
More detailed information on each of the vulnerabilities can be found in [November 2022 Security Releases](https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/) blog post.
68+
69+
### Commits
70+
71+
* \[[`39f8a672e3`](https://github.com/nodejs/node/commit/39f8a672e3)] - **deps**: update archs files for quictls/openssl-3.0.7+quic [nodejs/node#45286](https://github.com/nodejs/node/pull/45286)
72+
* \[[`80218127c8`](https://github.com/nodejs/node/commit/80218127c8)] - **deps**: upgrade openssl sources to quictls/openssl-3.0.7+quic [nodejs/node#45286](https://github.com/nodejs/node/pull/45286)
73+
* \[[`165342beac`](https://github.com/nodejs/node/commit/165342beac)] - **inspector**: harden IP address validation again (Tobias Nießen) [nodejs-private/node-private#354](https://github.com/nodejs-private/node-private/pull/354)
74+
5275
<a id="18.12.0"></a>
5376

5477
## 2022-10-25, Version 18.12.0 'Hydrogen' (LTS), @ruyadorno and @RafaelGSS

src/node_version.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
#define NODE_VERSION_IS_LTS 1
3030
#define NODE_VERSION_LTS_CODENAME "Hydrogen"
3131

32-
#define NODE_VERSION_IS_RELEASE 0
32+
#define NODE_VERSION_IS_RELEASE 1
3333

3434
#ifndef NODE_STRINGIFY
3535
#define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n)

0 commit comments

Comments
 (0)