Skip to content

Commit

Permalink
2016-09-27, Version 4.6.0 'Argon' (LTS)
Browse files Browse the repository at this point in the history
    This is a security release. All Node.js users should consult the
    security release summary at
    https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
    for details on patched vulnerabilities.

    Notable Changes

    Semver Minor:

    * openssl:
      - Upgrade to 1.0.2i, fixes a number of defects impacting Node.js:
        CVE-2016-6304 ("OCSP Status Request extension unbounded memory
        growth", high severity), CVE-2016-2183, CVE-2016-6303,
        CVE-2016-2178 and CVE-2016-6306.
        (Shigeki Ohtsu) nodejs/node#8714
      - Upgrade to 1.0.2j, fixes a defect included in 1.0.2i resulting in
        a crash when using CRLs, CVE-2016-7052.
        (Shigeki Ohtsu) nodejs/node#8786
      - Remove support for loading dynamic third-party engine modules.
        An attacker may be able to hide malicious code to be inserted into
        Node.js at runtime by masquerading as one of the dynamic engine
        modules. Originally reported by Ahmed Zaki (Skype).
        (Ben Noordhuis) https://github.com/nodejs/node-private/pull/70
    * http: CVE-2016-5325 - Properly validate for allowable characters in
      the `reason` argument in `ServerResponse#writeHead()`. Fixes a
      possible response splitting attack vector. This introduces a new
      case where `throw` may occur when configuring HTTP responses, users
      should already be adopting try/catch here. Originally reported
      independently by Evan Lucas and Romain Gaucher.
      (Evan Lucas) https://github.com/nodejs/node-private/pull/46

    Semver Patch:

    * buffer: Zero-fill excess bytes in new `Buffer` objects created with
      `Buffer.concat()` while providing a `totalLength` parameter that
      exceeds the total length of the original `Buffer` objects being
      concatenated.
      https://github.com/nodejs/node-private/pull/65
    * tls: CVE-2016-7099 - Fix invalid wildcard certificate validation
      check whereby a TLS server may be able to serve an invalid wildcard
      certificate for its hostname due to improper validation of `*.` in
      the wildcard string. Originally reported by Alexander Minozhenko and
      James Bunton (Atlassian).
      (Ben Noordhuis) https://github.com/nodejs/node-private/pull/63

Signed-off-by: Ilkka Myller <[email protected]>
  • Loading branch information
imyller committed Sep 28, 2016
1 parent 30143aa commit 99721d4
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ OpenEmbedded layer for latest [Node.js](https://nodejs.org/ "Node.js") releases.
## Node.js releases

* ![Current 6](https://img.shields.io/badge/Node.js%20Current-6.6.0-green.svg)
* ![LTS 4](https://img.shields.io/badge/Node.js%20LTS-4.5.0-blue.svg)
* ![LTS 4](https://img.shields.io/badge/Node.js%20LTS-4.6.0-blue.svg)
* ![Maintenance 0.12](https://img.shields.io/badge/Node.js%20Maintenance-0.12.16-lightgray.svg)
* ![Maintenance 0.10](https://img.shields.io/badge/Node.js%20Maintenance-0.10.47-lightgray.svg)
* ![Legacy 0.8](https://img.shields.io/badge/Node.js%20Legacy-0.8.28-lightgrey.svg)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,5 +6,5 @@ INC_PR = "r1"

LIC_FILES_CHKSUM = "file://LICENSE;md5=8e3c01094f0fcb889b13f0354e52f914"

SRC_URI[src.md5sum] = "1885586b4b8a2263f77dce27855661e9"
SRC_URI[src.sha256sum] = "74ced83b8d890d90e2a8b0d54b0d0e9b5e01d6fd6148cec6e9911ff6eaf0cf21"
SRC_URI[src.md5sum] = "da43ffb5d05f2488cce379300e80656b"
SRC_URI[src.sha256sum] = "0838f12e329edb252e6e6baddca85632bf5ff2ec900e737e88f9bf9b38946b1b"

0 comments on commit 99721d4

Please sign in to comment.