-
-
Notifications
You must be signed in to change notification settings - Fork 34.4k
Comparing changes
Open a pull request
base repository: nodejs/node
base: v18.18.1
head repository: nodejs/node
compare: v18.18.2
- 12 commits
- 58 files changed
- 7 contributors
Commits on Oct 10, 2023
-
Configuration menu - View commit details
-
Copy full SHA for b2b3118 - Browse repository at this point
Copy the full SHA b2b3118View commit details
Commits on Oct 12, 2023
-
Revert "deps: update nghttp2 to 1.55.0"
This reverts commit c8da8c8. PR-URL: #50151 Reviewed-By: Rafael Gonzaga <[email protected]> Reviewed-By: Jiawen Geng <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7d83ed0 - Browse repository at this point
Copy the full SHA 7d83ed0View commit details -
deps: update nghttp2 to 1.53.0
PR-URL: #47997 Backport-PR-URL: #50151 Reviewed-By: Rafael Gonzaga <[email protected]> Reviewed-By: Luigi Pinca <[email protected]> Reviewed-By: Marco Ippolito <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 300a902 - Browse repository at this point
Copy the full SHA 300a902View commit details -
deps: update nghttp2 to 1.55.0
PR-URL: #48746 Backport-PR-URL: #50151 Reviewed-By: Luigi Pinca <[email protected]> Reviewed-By: Michaël Zasso <[email protected]> Reviewed-By: Rafael Gonzaga <[email protected]> Reviewed-By: Marco Ippolito <[email protected]> Reviewed-By: Yagiz Nizipli <[email protected]> Reviewed-By: Trivikram Kamat <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 85672c1 - Browse repository at this point
Copy the full SHA 85672c1View commit details -
deps: update nghttp2 to 1.55.1
PR-URL: #48790 Backport-PR-URL: #50151 Reviewed-By: Luigi Pinca <[email protected]> Reviewed-By: Yongsheng Zhang <[email protected]> Reviewed-By: Stephen Belanger <[email protected]> Reviewed-By: Rafael Gonzaga <[email protected]> Reviewed-By: Yagiz Nizipli <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7e9b08d - Browse repository at this point
Copy the full SHA 7e9b08dView commit details -
deps: update nghttp2 to 1.56.0
PR-URL: #49582 Backport-PR-URL: #50151 Reviewed-By: Luigi Pinca <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f6444de - Browse repository at this point
Copy the full SHA f6444deView commit details -
deps: update nghttp2 to 1.57.0
PR-URL: #50121 Backport-PR-URL: #50151 Reviewed-By: Matteo Collina <[email protected]> Reviewed-By: Michael Dawson <[email protected]> Reviewed-By: Rich Trott <[email protected]> Reviewed-By: Marco Ippolito <[email protected]> Reviewed-By: Tobias Nießen <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a792bbc - Browse repository at this point
Copy the full SHA a792bbcView commit details
Commits on Oct 13, 2023
-
policy: use tamper-proof integrity check function
Using the JavaScript Hash class is unsafe because its internals can be tampered with. In particular, an application can cause Hash.prototype.digest() to return arbitrary values, thus allowing to circumvent the integrity verification that policies are supposed to guarantee. Add and use a new C++ binding internalVerifyIntegrity() that (hopefully) cannot be tampered with from JavaScript. PR-URL: nodejs-private/node-private#462 Backport-PR-URL: nodejs-private/node-private#493 Reviewed-By: Rafael Gonzaga <[email protected]> CVE-ID: CVE-2023-38552
Configuration menu - View commit details
-
Copy full SHA for 1c53893 - Browse repository at this point
Copy the full SHA 1c53893View commit details -
module: fix code injection through export names
createDynamicModule() properly escapes import names, but not export names. In WebAssembly, any string is a valid export name. Importing a WebAssembly module that uses a non-identifier export name leads to either a syntax error in createDynamicModule() or to code injection, that is, to the evaluation of almost arbitrary JavaScript code outside of the WebAssembly module. To address this issue, adopt the same mechanism in createExport() that createImport() already uses. Add tests for both exports and imports. PR-URL: nodejs-private/node-private#461 Backport-PR-URL: nodejs-private/node-private#490 Reviewed-By: Rafael Gonzaga <[email protected]> CVE-ID: CVE-2023-39333
Configuration menu - View commit details
-
Copy full SHA for eaf9083 - Browse repository at this point
Copy the full SHA eaf9083View commit details -
lib: let deps require
nodeprefixed modulesfixup fixup PR-URL: #50047 Reviewed-By: Antoine du Hamel <[email protected]> Reviewed-By: Filip Skokan <[email protected]> Reviewed-By: Michaël Zasso <[email protected]> Reviewed-By: Benjamin Gruenbaum <[email protected]> Reviewed-By: Luigi Pinca <[email protected]> Reviewed-By: Stephen Belanger <[email protected]> Reviewed-By: Zeyu "Alex" Yang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1193ca5 - Browse repository at this point
Copy the full SHA 1193ca5View commit details -
deps: update undici to v5.26.3
Signed-off-by: Matteo Collina <[email protected]> PR-URL: #50153 Reviewed-By: Yagiz Nizipli <[email protected]> Reviewed-By: Rafael Gonzaga <[email protected]> Reviewed-By: Filip Skokan <[email protected]> Reviewed-By: Matthew Aitken <[email protected]> Reviewed-By: Marco Ippolito <[email protected]> CVE-ID: CVE-2023-45143
Configuration menu - View commit details
-
Copy full SHA for 5502846 - Browse repository at this point
Copy the full SHA 5502846View commit details -
2023-10-13, Version 18.18.2 'Hydrogen' (LTS)
This is a security release. Notable changes: * [CVE-2023-44487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487): `nghttp2` Security Release (High) * [CVE-2023-45143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45143): `undici` Security Release (High) * [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity checks according to policies can be circumvented (Medium) * [CVE-2023-39333](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39333): Code injection via WebAssembly export names (Low) PR-URL: nodejs-private/node-private#492
Configuration menu - View commit details
-
Copy full SHA for 8a01b3d - Browse repository at this point
Copy the full SHA 8a01b3dView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v18.18.1...v18.18.2