Skip to content

Commit 1522a93

Browse files
committed
2021-04-06, Version 14.16.1 'Fermium' (LTS)
This is a security release. Notable Changes: Vulnerabilities fixed: - **CVE-2021-3450**: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High) - **CVE-2021-3449**: OpenSSL - NULL pointer deref in signature_algorithms processing (High) - **CVE-2020-7774**: npm upgrade - Update y18n to fix Prototype-Pollution (High) PR-URL: #38082
1 parent d318ec7 commit 1522a93

File tree

2 files changed

+31
-1
lines changed

2 files changed

+31
-1
lines changed

CHANGELOG.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,8 @@ release.
5151
<a href="doc/changelogs/CHANGELOG_V15.md#15.0.0">15.0.0</a><br/>
5252
</td>
5353
<td valign="top">
54-
<b><a href="doc/changelogs/CHANGELOG_V14.md#14.16.0">14.16.0</a></b><br/>
54+
<b><a href="doc/changelogs/CHANGELOG_V14.md#14.16.1">14.16.1</a></b><br/>
55+
<a href="doc/changelogs/CHANGELOG_V14.md#14.16.0">14.16.0</a><br/>
5556
<a href="doc/changelogs/CHANGELOG_V14.md#14.15.5">14.15.5</a><br/>
5657
<a href="doc/changelogs/CHANGELOG_V14.md#14.15.4">14.15.4</a><br/>
5758
<a href="doc/changelogs/CHANGELOG_V14.md#14.15.3">14.15.3</a><br/>

doc/changelogs/CHANGELOG_V14.md

+29
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@
1111
</tr>
1212
<tr>
1313
<td valign="top">
14+
<a href="#14.16.1">14.16.1</a><br/>
1415
<a href="#14.16.0">14.16.0</a><br/>
1516
<a href="#14.15.5">14.15.5</a><br/>
1617
<a href="#14.15.4">14.15.4</a><br/>
@@ -58,6 +59,34 @@
5859
* [io.js](CHANGELOG_IOJS.md)
5960
* [Archive](CHANGELOG_ARCHIVE.md)
6061

62+
<a id="14.16.1"></a>
63+
## 2021-04-06, Version 14.16.1 'Fermium' (LTS), @mylesborins
64+
65+
This is a security release.
66+
67+
### Notable Changes
68+
69+
Vulnerabilities fixed:
70+
71+
* **CVE-2021-3450**: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High)
72+
* This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt
73+
* Impacts:
74+
* All versions of the 15.x, 14.x, 12.x and 10.x releases lines
75+
* **CVE-2021-3449**: OpenSSL - NULL pointer deref in signature_algorithms processing (High)
76+
* This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt
77+
* Impacts:
78+
* All versions of the 15.x, 14.x, 12.x and 10.x releases lines
79+
* **CVE-2020-7774**: npm upgrade - Update y18n to fix Prototype-Pollution (High)
80+
* This is a vulnerability in the y18n npm module which may be exploited by prototype pollution. You can read more about it in https://github.com/advisories/GHSA-c4w7-xm78-47vh
81+
* Impacts:
82+
* All versions of the 14.x, 12.x and 10.x releases lines
83+
84+
### Commits
85+
86+
* [[`467be7a950`](https://github.com/nodejs/node/commit/467be7a950)] - **deps**: upgrade npm to 6.14.12 (Ruy Adorno) [#37918](https://github.com/nodejs/node/pull/37918)
87+
* [[`6bc8f58182`](https://github.com/nodejs/node/commit/6bc8f58182)] - **deps**: update archs files for OpenSSL-1.1.1k (Tobias Nießen) [#37938](https://github.com/nodejs/node/pull/37938)
88+
* [[`403a014ef6`](https://github.com/nodejs/node/commit/403a014ef6)] - **deps**: upgrade openssl sources to 1.1.1k (Tobias Nießen) [#37938](https://github.com/nodejs/node/pull/37938)
89+
6190
<a id="14.16.0"></a>
6291
## 2021-02-23, Version 14.16.0 'Fermium' (LTS), @BethGriggs
6392

0 commit comments

Comments
 (0)