Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release proposal: v0.10.43 (Maintenance) #5404

Closed
wants to merge 8 commits into from
Closed

Commits on Feb 11, 2016

  1. domains: fix handling of uncaught exceptions

    Fix node exiting due to an exception being thrown rather than emitting
    an 'uncaughtException' event on the process object when:
    1. no error handler is set on the domain within which an error is thrown
    2. an 'uncaughtException' event listener is set on the process
    
    Also fix an issue where the process would not abort in the proper
    function call if an error is thrown within a domain with no error
    handler and --abort-on-uncaught-exception is used.
    
    Fixes #3607 and #3653.
    
    PR: #3887
    PR-URL: #3887
    Reviewed-By: James M Snell <jasnell@gmail.com>
    Julien Gilli authored and Myles Borins committed Feb 11, 2016
    Configuration menu
    Copy the full SHA
    563c359 View commit details
    Browse the repository at this point in the history

Commits on Feb 24, 2016

  1. deps: update http-parser to version 1.2

    Fixes http-parser regression with IS_HEADER_CHAR check
    Add test case for obstext characters (> 0x80) in header
    
    PR-URL: #5242
    Reviewed-By: Rod Vagg <rod@vagg.org>
    jasnell authored and rvagg committed Feb 24, 2016
    Configuration menu
    Copy the full SHA
    1e45a61 View commit details
    Browse the repository at this point in the history

Commits on Mar 1, 2016

  1. deps: upgrade openssl to 1.0.1s

    PR-URL: #5508
    Reviewed-By: Fedor Indutny <fedor@indutny.com>
    bnoordhuis committed Mar 1, 2016
    Configuration menu
    Copy the full SHA
    42ded2a View commit details
    Browse the repository at this point in the history

Commits on Mar 2, 2016

  1. test: fix hanging http obstext test

    Set the Connection header to 'close' to work around a v0.10 quirk.
    Prevents the test from timing out due to a still open TCP connection.
    Test introduced in 1e45a61 ("deps: update http-parser to version 1.2").
    
    PR-URL: #5511
    Reviewed-By: James M Snell <jasnell@gmail.com>
    bnoordhuis committed Mar 2, 2016
    Configuration menu
    Copy the full SHA
    e483f3f View commit details
    Browse the repository at this point in the history
  2. crypto,tls: remove SSLv2 support

    Remove support for SSLv2 because of DROWN (CVE-2016-0800).
    
    Use of the `--enable-ssl2` flag is now an error; node will print an
    error message and exit.
    
    Fixes: nodejs/Release#80
    PR-URL: #5529
    Reviewed-By: Rod Vagg <rod@vagg.org>
    bnoordhuis committed Mar 2, 2016
    Configuration menu
    Copy the full SHA
    f8cb0dc View commit details
    Browse the repository at this point in the history

Commits on Mar 3, 2016

  1. doc: remove SSLv2 descriptions

    Doc descriptions related to SSLv2 are no longer needed.
    
    Fixes: #5529
    PR-URL: #5541
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
    Shigeki Ohtsu committed Mar 3, 2016
    Configuration menu
    Copy the full SHA
    6db377b View commit details
    Browse the repository at this point in the history
  2. build: update Node.js logo on OSX installer

    PR-URL: #5401
    Reviewed-By: Johan Bergström <bugs@bergstroem.nu>
    Reviewed-By: kahwee
    Reviewed-By: fhemberger
    Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
    Reviewed-By: Sakthipriyan Vairamani <thechargingvolcano@gmail.com>
    rvagg committed Mar 3, 2016
    Configuration menu
    Copy the full SHA
    164157a View commit details
    Browse the repository at this point in the history
  3. 2016-03-03 Version 0.10.43 (Maintenance) Release

    Notable changes:
    
    * http_parser: Update to http-parser 1.2 to fix an unintentionally
      strict limitation of allowable header characters.
      (James M Snell) #5242
    * domains:
      - Prevent an exit due to an exception being thrown rather than
      emitting an 'uncaughtException' event on the `process` object when
      no error handler is set on the domain within which an error is
      thrown and an 'uncaughtException' event listener is set on
      `process`. (Julien Gilli) #3887
      - Fix an issue where the process would not abort in the proper
      function call if an error is thrown within a domain with no error
      handler and `--abort-on-uncaught-exception` is used.
      (Julien Gilli) #3887
    * openssl: Upgrade from 1.0.1r to 1.0.1s
      (Ben Noordhuis) #5508
      - Fix a double-free defect in parsing malformed DSA keys that may
        potentially be used for DoS or memory corruption attacks. It is
        likely to be very difficult to use this defect for a practical
        attack and is therefore considered low severity for Node.js users.
        More info is available at
        https://www.openssl.org/news/vulnerabilities.html#2016-0705
      - Fix a defect that can cause memory corruption in certain very rare
        cases relating to the internal `BN_hex2bn()` and `BN_dec2bn()`
        functions. It is believed that Node.js is not invoking the code
        paths that use these functions so practical attacks via Node.js
        using this defect are _unlikely_ to be possible. More info is
        available at
        https://www.openssl.org/news/vulnerabilities.html#2016-0797
      - Fix a defect that makes the CacheBleed Attack
        (https://ssrg.nicta.com.au/projects/TS/cachebleed/) possible.
        This defect enables attackers to execute side-channel attacks
        leading to the potential recovery of entire RSA private keys. It
        only affects the Intel Sandy Bridge (and possibly older)
        microarchitecture when using hyper-threading. Newer
        microarchitectures, including Haswell, are unaffected. More info
        is available at
        https://www.openssl.org/news/vulnerabilities.html#2016-0702
      - Remove SSLv2 support, the `--enable-ssl2` command line argument
        will now produce an error. The DROWN Attack
        (https://drownattack.com/) creates a vulnerability where SSLv2 is
        enabled by a server, even if a client connection is not using
        SSLv2. The SSLv2 protocol is widely considered unacceptably broken
        and should not be supported. More information is available at
        https://www.openssl.org/news/vulnerabilities.html#2016-0800
    
    PR-URL: #5404
    rvagg committed Mar 3, 2016
    Configuration menu
    Copy the full SHA
    6278f1d View commit details
    Browse the repository at this point in the history