Skip to content

Commit bc166e4

Browse files
committed
2021-04-06, Version 10.24.1 'Dubnium' (LTS)
This is a security release. Notable changes: Vulnerabilities fixed: - **CVE-2021-3450**: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High) - **CVE-2021-3449**: OpenSSL - NULL pointer deref in signature_algorithms processing (High) - **CVE-2020-7774**: npm upgrade - Update y18n to fix Prototype-Pollution (High) PR-URL: #38085
1 parent 5e526b9 commit bc166e4

File tree

3 files changed

+32
-2
lines changed

3 files changed

+32
-2
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,8 @@ release.
3333
<a href="doc/changelogs/CHANGELOG_V12.md#12.0.0">12.0.0</a><br/>
3434
</td>
3535
<td valign="top">
36-
<b><a href="doc/changelogs/CHANGELOG_V10.md#10.24.0">10.24.0</a></b><br/>
36+
<b><a href="doc/changelogs/CHANGELOG_V10.md#10.24.1">10.24.1</a></b><br/>
37+
<a href="doc/changelogs/CHANGELOG_V10.md#10.24.0">10.24.0</a><br/>
3738
<a href="doc/changelogs/CHANGELOG_V10.md#10.23.3">10.23.3</a><br/>
3839
<a href="doc/changelogs/CHANGELOG_V10.md#10.23.2">10.23.2</a><br/>
3940
<a href="doc/changelogs/CHANGELOG_V10.md#10.23.1">10.23.1</a><br/>

doc/changelogs/CHANGELOG_V10.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
</tr>
1111
<tr>
1212
<td valign="top">
13+
<a href="#10.24.1">10.24.1</a><br/>
1314
<a href="#10.24.0">10.24.0</a><br/>
1415
<a href="#10.23.3">10.23.3</a><br/>
1516
<a href="#10.23.2">10.23.2</a><br/>
@@ -69,6 +70,34 @@
6970
* [io.js](CHANGELOG_IOJS.md)
7071
* [Archive](CHANGELOG_ARCHIVE.md)
7172

73+
<a id="10.24.1"></a>
74+
## 2021-04-06, Version 10.24.1 'Dubnium' (LTS), @mylesborins
75+
76+
This is a security release.
77+
78+
### Notable Changes
79+
80+
Vulerabilties fixed:
81+
82+
* **CVE-2021-3450**: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High)
83+
* This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt
84+
* Impacts:
85+
* All versions of the 15.x, 14.x, 12.x and 10.x releases lines
86+
* **CVE-2021-3449**: OpenSSL - NULL pointer deref in signature_algorithms processing (High)
87+
* This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt
88+
* Impacts:
89+
* All versions of the 15.x, 14.x, 12.x and 10.x releases lines
90+
* **CVE-2020-7774**: npm upgrade - Update y18n to fix Prototype-Pollution (High)
91+
* This is a vulnerability in the y18n NPM module which may be exploited by prototype pollution. You can read more about it in https://github.com/advisories/GHSA-c4w7-xm78-47vh
92+
* Impacts:
93+
* All versions of the 14.x, 12.x and 10.x releases lines
94+
95+
### Commits
96+
97+
* [[`5e526b96ce`](https://github.com/nodejs/node/commit/5e526b96ce)] - **deps**: upgrade npm to 6.14.12 (Ruy Adorno) [#37918](https://github.com/nodejs/node/pull/37918)
98+
* [[`781cb6df5c`](https://github.com/nodejs/node/commit/781cb6df5c)] - **deps**: update archs files for OpenSSL-1.1.1k (Tobias Nießen) [#37940](https://github.com/nodejs/node/pull/37940)
99+
* [[`5db0a05a90`](https://github.com/nodejs/node/commit/5db0a05a90)] - **deps**: upgrade openssl sources to 1.1.1k (Tobias Nießen) [#37940](https://github.com/nodejs/node/pull/37940)
100+
72101
<a id="10.24.0"></a>
73102
## 2021-02-23, Version 10.24.0 'Dubnium' (LTS), @richardlau
74103

src/node_version.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
#define NODE_VERSION_IS_LTS 1
3030
#define NODE_VERSION_LTS_CODENAME "Dubnium"
3131

32-
#define NODE_VERSION_IS_RELEASE 0
32+
#define NODE_VERSION_IS_RELEASE 1
3333

3434
#ifndef NODE_STRINGIFY
3535
#define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n)

0 commit comments

Comments
 (0)