-
-
Notifications
You must be signed in to change notification settings - Fork 34.4k
Comparing changes
Open a pull request
base repository: nodejs/node
base: v20.8.0
head repository: nodejs/node
compare: v20.8.1
- 9 commits
- 50 files changed
- 6 contributors
Commits on Sep 29, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 5ec80f1 - Browse repository at this point
Copy the full SHA 5ec80f1View commit details
Commits on Oct 12, 2023
-
policy: use tamper-proof integrity check function
Using the JavaScript Hash class is unsafe because its internals can be tampered with. In particular, an application can cause Hash.prototype.digest() to return arbitrary values, thus allowing to circumvent the integrity verification that policies are supposed to guarantee. Add and use a new C++ binding internalVerifyIntegrity() that (hopefully) cannot be tampered with from JavaScript. PR-URL: nodejs-private/node-private#462 Reviewed-By: Rafael Gonzaga <[email protected]> CVE-ID: CVE-2023-38552
Configuration menu - View commit details
-
Copy full SHA for a4cb7fc - Browse repository at this point
Copy the full SHA a4cb7fcView commit details -
module: fix code injection through export names
createDynamicModule() properly escapes import names, but not export names. In WebAssembly, any string is a valid export name. Importing a WebAssembly module that uses a non-identifier export name leads to either a syntax error in createDynamicModule() or to code injection, that is, to the evaluation of almost arbitrary JavaScript code outside of the WebAssembly module. To address this issue, adopt the same mechanism in createExport() that createImport() already uses. Add tests for both exports and imports. PR-URL: nodejs-private/node-private#461 Backport-PR-URL: nodejs-private/node-private#489 Reviewed-By: Rafael Gonzaga <[email protected]> CVE-ID: CVE-2023-39333
Configuration menu - View commit details
-
Copy full SHA for f5c90b2 - Browse repository at this point
Copy the full SHA f5c90b2View commit details
Commits on Oct 13, 2023
-
lib: let deps require
nodeprefixed modulesfixup fixup PR-URL: #50047 Reviewed-By: Antoine du Hamel <[email protected]> Reviewed-By: Filip Skokan <[email protected]> Reviewed-By: MichaΓ«l Zasso <[email protected]> Reviewed-By: Benjamin Gruenbaum <[email protected]> Reviewed-By: Luigi Pinca <[email protected]> Reviewed-By: Stephen Belanger <[email protected]> Reviewed-By: Zeyu "Alex" Yang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cd37838 - Browse repository at this point
Copy the full SHA cd37838View commit details -
deps: update undici to v5.26.3
Signed-off-by: Matteo Collina <[email protected]> PR-URL: #50153 Reviewed-By: Yagiz Nizipli <[email protected]> Reviewed-By: Rafael Gonzaga <[email protected]> Reviewed-By: Filip Skokan <[email protected]> Reviewed-By: Matthew Aitken <[email protected]> Reviewed-By: Marco Ippolito <[email protected]> CVE-ID: CVE-2023-45143
1Configuration menu - View commit details
-
Copy full SHA for 2860631 - Browse repository at this point
Copy the full SHA 2860631View commit details -
deps: update nghttp2 to 1.57.0
PR-URL: #50121 Reviewed-By: Matteo Collina <[email protected]> Reviewed-By: Michael Dawson <[email protected]> Reviewed-By: Rich Trott <[email protected]> Reviewed-By: Marco Ippolito <[email protected]> Reviewed-By: Tobias NieΓen <[email protected]> CVE-ID: CVE-2023-44487
Configuration menu - View commit details
-
Copy full SHA for c86883e - Browse repository at this point
Copy the full SHA c86883eView commit details -
permission: improve path traversal protection
Always use the original implementation of pathModule.resolve. If the application overwrites the value of pathModule.resolve with a custom implementation, it should not have any effect on the permission model. PR-URL: nodejs-private/node-private#456 Reviewed-By: Rafael Gonzaga <[email protected]> CVE-ID: CVE-2023-39331
Configuration menu - View commit details
-
Copy full SHA for cd35275 - Browse repository at this point
Copy the full SHA cd35275View commit details -
permission: fix Uint8Array path traversal
Previous security patches addressed path traversal vulnerabilities for string and Buffer inputs, but ignored Uint8Array inputs. This commit fixes the existing logic to account for the latter. The previous implementation would silently ignore unexpected inputs, whereas this commit introduces an explicit assertion to prevent that unsafe behavior. PR-URL: nodejs-private/node-private#456 Reviewed-By: Rafael Gonzaga <[email protected]> CVE-ID: CVE-2023-39332
Configuration menu - View commit details
-
Copy full SHA for fa5dae1 - Browse repository at this point
Copy the full SHA fa5dae1View commit details -
2023-10-13, Version 20.8.1 (Current)
This is a security release. Notable changes: * CVE-2023-44487: `nghttp2` Security Release (High) * CVE-2023-45143: `undici` Security Release (High) * CVE-2023-39332: Path traversal through path stored in Uint8Array (High) * CVE-2023-39331: Permission model improperly protects against path traversal (High) * CVE-2023-38552: Integrity checks according to policies can be circumvented (Medium) * CVE-2023-39333: Code injection via WebAssembly export names (Low) PR-URL: nodejs-private/node-private#491
Configuration menu - View commit details
-
Copy full SHA for b485ffc - Browse repository at this point
Copy the full SHA b485ffcView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we canβt render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v20.8.0...v20.8.1