Skip to content

Commit acb71ea

Browse files
committed
2022-01-10, Version 16.13.2 'Gallium' (LTS)
This is a security release. Notable changes: Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531) - Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly. - Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the `--security-revert` command-line option. - More details will be available at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531 Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532) - Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints. - Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the `--security-revert` command-line option. - More details will be available at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532 Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533) - Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification. - Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable. - More details will be available at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533 Prototype pollution via `console.table` properties (Low)(CVE-2022-21824) - Due to the formatting logic of the `console.table()` function it was not safe to allow user controlled input to be passed to the `properties` parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be `__proto__`. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype. - Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to. - More details will be available at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824 PR-URL: nodejs-private/node-private#312
1 parent 9a0a189 commit acb71ea

File tree

5 files changed

+58
-5
lines changed

5 files changed

+58
-5
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,8 @@ release.
3333
</tr>
3434
<tr>
3535
<td valign="top">
36-
<b><a href="doc/changelogs/CHANGELOG_V16.md#16.13.1">16.13.1</a></b><br/>
36+
<b><a href="doc/changelogs/CHANGELOG_V16.md#16.13.2">16.13.2</a></b><br/>
37+
<a href="doc/changelogs/CHANGELOG_V16.md#16.13.1">16.13.1</a><br/>
3738
<a href="doc/changelogs/CHANGELOG_V16.md#16.13.0">16.13.0</a><br/>
3839
<a href="doc/changelogs/CHANGELOG_V16.md#16.12.0">16.12.0</a><br/>
3940
<a href="doc/changelogs/CHANGELOG_V16.md#16.11.1">16.11.1</a><br/>

doc/api/crypto.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2566,7 +2566,7 @@ The SHA-256 fingerprint of this certificate.
25662566
<!-- YAML
25672567
added: v15.6.0
25682568
changes:
2569-
- version: REPLACEME
2569+
- version: v16.13.2
25702570
pr-url: https://github.com/nodejs-private/node-private/pull/300
25712571
description: Parts of this string may be encoded as JSON string literals
25722572
in response to CVE-2021-44532.
@@ -2663,7 +2663,7 @@ The complete subject of this certificate.
26632663
<!-- YAML
26642664
added: v15.6.0
26652665
changes:
2666-
- version: REPLACEME
2666+
- version: v16.13.2
26672667
pr-url: https://github.com/nodejs-private/node-private/pull/300
26682668
description: Parts of this string may be encoded as JSON string literals
26692669
in response to CVE-2021-44532.

doc/api/tls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1454,7 +1454,7 @@ decrease overall server throughput.
14541454
<!-- YAML
14551455
added: v0.8.4
14561456
changes:
1457-
- version: REPLACEME
1457+
- version: v16.13.2
14581458
pr-url: https://github.com/nodejs-private/node-private/pull/300
14591459
description: Support for `uniformResourceIdentifier` subject alternative
14601460
names has been disabled in response to CVE-2021-44531.

doc/changelogs/CHANGELOG_V16.md

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
</tr>
1010
<tr>
1111
<td>
12+
<a href="#16.13.2">16.13.2</a><br/>
1213
<a href="#16.13.1">16.13.1</a><br/>
1314
<a href="#16.13.0">16.13.0</a><br/>
1415
</td>
@@ -54,6 +55,57 @@
5455
* [io.js](CHANGELOG\_IOJS.md)
5556
* [Archive](CHANGELOG\_ARCHIVE.md)
5657

58+
<a id="16.13.2"></a>
59+
60+
## 2022-01-10, Version 16.13.2 'Gallium' (LTS), @danielleadams
61+
62+
This is a security release.
63+
64+
### Notable changes
65+
66+
#### Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)
67+
68+
Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.
69+
70+
Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the `--security-revert` command-line option.
71+
72+
More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531) after publication.
73+
74+
#### Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)
75+
76+
Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.
77+
78+
Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the `--security-revert` command-line option.
79+
80+
More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532) after publication.
81+
82+
#### Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)
83+
84+
Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.
85+
86+
Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
87+
88+
More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533) after publication.
89+
90+
#### Prototype pollution via `console.table` properties (Low)(CVE-2022-21824)
91+
92+
Due to the formatting logic of the `console.table()` function it was not safe to allow user controlled input to be passed to the `properties` parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be `__proto__`. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.
93+
94+
Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to.
95+
96+
More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824) after publication.
97+
98+
Thanks to Patrik Oldsberg (rugvip) for reporting this vulnerability.
99+
100+
### Commits
101+
102+
* [[`8dd4ca4537`](https://github.com/nodejs/node/commit/8dd4ca4537)] - **console**: fix prototype pollution via console.table (Tobias Nießen) [nodejs-private/node-private#307](https://github.com/nodejs-private/node-private/pull/307)
103+
* [[`e52882da4c`](https://github.com/nodejs/node/commit/e52882da4c)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias Nießen) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
104+
* [[`9a0a189b0b`](https://github.com/nodejs/node/commit/9a0a189b0b)] - **src**: add cve reverts and associated tests (Michael Dawson) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
105+
* [[`4a262d42bc`](https://github.com/nodejs/node/commit/4a262d42bc)] - **src**: remove unused x509 functions (Tobias Nießen) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
106+
* [[`965536fe3d`](https://github.com/nodejs/node/commit/965536fe3d)] - **tls**: fix handling of x509 subject and issuer (Tobias Nießen) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
107+
* [[`a2cbfa95ff`](https://github.com/nodejs/node/commit/a2cbfa95ff)] - **tls**: drop support for URI alternative names (Tobias Nießen) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
108+
57109
<a id="16.13.1"></a>
58110

59111
## 2021-12-01, Version 16.13.1 'Gallium' (LTS), @BethGriggs

src/node_version.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
#define NODE_VERSION_IS_LTS 1
3030
#define NODE_VERSION_LTS_CODENAME "Gallium"
3131

32-
#define NODE_VERSION_IS_RELEASE 0
32+
#define NODE_VERSION_IS_RELEASE 1
3333

3434
#ifndef NODE_STRINGIFY
3535
#define NODE_STRINGIFY(n) NODE_STRINGIFY_HELPER(n)

0 commit comments

Comments
 (0)