Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: nodejs/node
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v20.8.0
Choose a base ref
...
head repository: nodejs/node
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v20.8.1
Choose a head ref
  • 9 commits
  • 50 files changed
  • 6 contributors

Commits on Sep 29, 2023

  1. Working on v20.8.1

    PR-URL: #49932
    ruyadorno committed Sep 29, 2023
    Configuration menu
    Copy the full SHA
    5ec80f1 View commit details
    Browse the repository at this point in the history

Commits on Oct 12, 2023

  1. policy: use tamper-proof integrity check function

    Using the JavaScript Hash class is unsafe because its internals can be
    tampered with. In particular, an application can cause
    Hash.prototype.digest() to return arbitrary values, thus allowing to
    circumvent the integrity verification that policies are supposed to
    guarantee.
    
    Add and use a new C++ binding internalVerifyIntegrity() that (hopefully)
    cannot be tampered with from JavaScript.
    
    PR-URL: nodejs-private/node-private#462
    Reviewed-By: Rafael Gonzaga <[email protected]>
    CVE-ID: CVE-2023-38552
    tniessen authored and RafaelGSS committed Oct 12, 2023
    Configuration menu
    Copy the full SHA
    a4cb7fc View commit details
    Browse the repository at this point in the history
  2. module: fix code injection through export names

    createDynamicModule() properly escapes import names, but not export
    names. In WebAssembly, any string is a valid export name. Importing a
    WebAssembly module that uses a non-identifier export name leads to
    either a syntax error in createDynamicModule() or to code injection,
    that is, to the evaluation of almost arbitrary JavaScript code outside
    of the WebAssembly module.
    
    To address this issue, adopt the same mechanism in createExport() that
    createImport() already uses. Add tests for both exports and imports.
    
    PR-URL: nodejs-private/node-private#461
    Backport-PR-URL: nodejs-private/node-private#489
    Reviewed-By: Rafael Gonzaga <[email protected]>
    CVE-ID: CVE-2023-39333
    tniessen authored and RafaelGSS committed Oct 12, 2023
    Configuration menu
    Copy the full SHA
    f5c90b2 View commit details
    Browse the repository at this point in the history

Commits on Oct 13, 2023

  1. lib: let deps require node prefixed modules

    fixup
    
    fixup
    
    PR-URL: #50047
    Reviewed-By: Antoine du Hamel <[email protected]>
    Reviewed-By: Filip Skokan <[email protected]>
    Reviewed-By: MichaΓ«l Zasso <[email protected]>
    Reviewed-By: Benjamin Gruenbaum <[email protected]>
    Reviewed-By: Luigi Pinca <[email protected]>
    Reviewed-By: Stephen Belanger <[email protected]>
    Reviewed-By: Zeyu "Alex" Yang <[email protected]>
    KhafraDev authored and RafaelGSS committed Oct 13, 2023
    Configuration menu
    Copy the full SHA
    cd37838 View commit details
    Browse the repository at this point in the history
  2. deps: update undici to v5.26.3

    Signed-off-by: Matteo Collina <[email protected]>
    PR-URL: #50153
    Reviewed-By: Yagiz Nizipli <[email protected]>
    Reviewed-By: Rafael Gonzaga <[email protected]>
    Reviewed-By: Filip Skokan <[email protected]>
    Reviewed-By: Matthew Aitken <[email protected]>
    Reviewed-By: Marco Ippolito <[email protected]>
    CVE-ID: CVE-2023-45143
    mcollina authored and RafaelGSS committed Oct 13, 2023
    1 Configuration menu
    Copy the full SHA
    2860631 View commit details
    Browse the repository at this point in the history
  3. deps: update nghttp2 to 1.57.0

    PR-URL: #50121
    Reviewed-By: Matteo Collina <[email protected]>
    Reviewed-By: Michael Dawson <[email protected]>
    Reviewed-By: Rich Trott <[email protected]>
    Reviewed-By: Marco Ippolito <[email protected]>
    Reviewed-By: Tobias Nießen <[email protected]>
    CVE-ID: CVE-2023-44487
    jasnell authored and RafaelGSS committed Oct 13, 2023
    Configuration menu
    Copy the full SHA
    c86883e View commit details
    Browse the repository at this point in the history
  4. permission: improve path traversal protection

    Always use the original implementation of pathModule.resolve. If the
    application overwrites the value of pathModule.resolve with a custom
    implementation, it should not have any effect on the permission model.
    
    PR-URL: nodejs-private/node-private#456
    Reviewed-By: Rafael Gonzaga <[email protected]>
    CVE-ID: CVE-2023-39331
    tniessen authored and RafaelGSS committed Oct 13, 2023
    Configuration menu
    Copy the full SHA
    cd35275 View commit details
    Browse the repository at this point in the history
  5. permission: fix Uint8Array path traversal

    Previous security patches addressed path traversal vulnerabilities for
    string and Buffer inputs, but ignored Uint8Array inputs. This commit
    fixes the existing logic to account for the latter.
    
    The previous implementation would silently ignore unexpected inputs,
    whereas this commit introduces an explicit assertion to prevent that
    unsafe behavior.
    
    PR-URL: nodejs-private/node-private#456
    Reviewed-By: Rafael Gonzaga <[email protected]>
    CVE-ID: CVE-2023-39332
    tniessen authored and RafaelGSS committed Oct 13, 2023
    Configuration menu
    Copy the full SHA
    fa5dae1 View commit details
    Browse the repository at this point in the history
  6. 2023-10-13, Version 20.8.1 (Current)

    This is a security release.
    
    Notable changes:
    
    * CVE-2023-44487: `nghttp2` Security Release (High)
    * CVE-2023-45143: `undici` Security Release (High)
    * CVE-2023-39332: Path traversal through path stored in Uint8Array (High)
    * CVE-2023-39331: Permission model improperly protects against path traversal (High)
    * CVE-2023-38552:  Integrity checks according to policies can be circumvented (Medium)
    * CVE-2023-39333: Code injection via WebAssembly export names (Low)
    
    PR-URL: nodejs-private/node-private#491
    RafaelGSS committed Oct 13, 2023
    Configuration menu
    Copy the full SHA
    b485ffc View commit details
    Browse the repository at this point in the history
Loading