8f462ce5d3
This is a security release. The following CVEs are fixed in this release: * [CVE-2023-44487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487): `nghttp2` Security Release (High) * [CVE-2023-45143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45143): `undici` Security Release (High) * [CVE-2023-39332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39332): Path traversal through path stored in Uint8Array (High) * [CVE-2023-39331](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39331): Permission model improperly protects against path traversal (High) * [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity checks according to policies can be circumvented (Medium) * [CVE-2023-39333](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39333): Code injection via WebAssembly export names (Low) More detailed information on each of the vulnerabilities can be found in [October 2023 Security Releases](https://nodejs.org/en/blog/vulnerability/october-2023-security-releases/) blog post. Signed-off-by: Stephen Gallagher <sgallagh@redhat.com> |
||
---|---|---|
packaging | ||
.gitignore | ||
0001-Remove-unused-OpenSSL-config.patch | ||
btest402.js | ||
changelog | ||
macros.nodejs | ||
nodejs20.spec | ||
nodejs-sources.sh | ||
nodejs.pc.in | ||
npmrc | ||
npmrc.builtin.in | ||
README-packaging.md | ||
sources | ||
test2.js | ||
v8.pc.in |