Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release proposal: v5.7.1 #5464

Merged
merged 2 commits into from
Mar 2, 2016
Merged

Release proposal: v5.7.1 #5464

merged 2 commits into from
Mar 2, 2016

Commits on Mar 2, 2016

  1. 2016-03-02, Version 5.7.1 (Stable)

    Notable changes:
    
    * governance: The Core Technical Committee (CTC) added four new members
    to help guide Node.js core development: Evan Lucas, Rich Trott, Ali
    Ijaz Sheikh and Сковорода Никита Андреевич (Nikita Skovoroda).
    
    * openssl: Upgrade from 1.0.2f to 1.0.2g (Ben Noordhuis)
    #5507
      - Fix a double-free defect in parsing malformed DSA keys that may
    potentially be used for DoS or memory corruption attacks. It is likely
    to be very difficult to use this defect for a practical attack and is
    therefore considered low severity for Node.js users. More info is
    available at https://www.openssl.org/news/vulnerabilities.html#2016-0705
      - Fix a defect that can cause memory corruption in certain very rare
    cases relating to the internal `BN_hex2bn()` and `BN_dec2bn()`
    functions. It is believed that Node.js is not invoking the code paths
    that use these functions so practical attacks via Node.js using this
    defect are _unlikely_ to be possible. More info is available at
    https://www.openssl.org/news/vulnerabilities.html#2016-0797
      - Fix a defect that makes the CacheBleed Attack
    (https://ssrg.nicta.com.au/projects/TS/cachebleed/) possible. This
    defect enables attackers to execute side-channel attacks leading to the
    potential recovery of entire RSA private keys. It only affects the
    Intel Sandy Bridge (and possibly older) microarchitecture when using
    hyper-threading. Newer microarchitectures, including Haswell, are
    unaffected. More info is available at
    https://www.openssl.org/news/vulnerabilities.html#2016-0702
    
    * Fixed several regressions that appeared in v5.7.0:
      - path.relative():
        - Output is no longer unnecessarily verbose (Brian White)
    #5389
        - Resolving UNC paths on Windows now works correctly (Owen Smith)
    #5456
        - Resolving paths with prefixes now works correctly from the root
    directory (Owen Smith) #5490
      - url: Fixed an off-by-one error with `parse()` (Brian White)
    #5394
      - dgram: Now correctly handles a default address case when offset and
    length are specified (Matteo Collina)
    #5407
    
    PR-URL: #5464
    Fishrock123 committed Mar 2, 2016
    Configuration menu
    Copy the full SHA
    805f054 View commit details
    Browse the repository at this point in the history
  2. Working on v5.7.1

    PR-URL: #5464
    Fishrock123 committed Mar 2, 2016
    Configuration menu
    Copy the full SHA
    3643670 View commit details
    Browse the repository at this point in the history