This repository has been archived by the owner on Jun 7, 2021. It is now read-only.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
10.16.0-slim
->10.16.3-slim
Release Notes
nodejs/node
v10.16.3
Compare Source
Notable changes
This is a security release.
Node.js, as well as many other implementations of HTTP/2, have been found
vulnerable to Denial of Service attacks.
See https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
for more information.
Vulnerabilities fixed:
Commits
74507fae34
] - deps: update nghttp2 to 1.39.2 (Anna Henningsen) #29122a397c881ec
] - deps: update nghttp2 to 1.39.1 (gengjiawen) #28448fedfa12a33
] - deps: update nghttp2 to 1.38.0 (gengjiawen) #27295ab0f2ace36
] - deps: update nghttp2 to 1.37.0 (gengjiawen) #269900acbe05ee2
] - http2: allow security revert for Ping/Settings Flood (Anna Henningsen) #29122c152449012
] - http2: pause input processing if sending output (Anna Henningsen) #291220ce699c7b1
] - http2: stop reading from socket if writes are in progress (Anna Henningsen) #2912217357d37a9
] - http2: consider 0-length non-end DATA frames an error (Anna Henningsen) #29122460f896c63
] - http2: shrink defaultvector::reserve()
allocations (Anna Henningsen) #29122f4242e24f9
] - http2: handle 0-length headers better (Anna Henningsen) #29122477461a51f
] - http2: limit number of invalid incoming frames (Anna Henningsen) #2912205dada46ee
] - http2: limit number of rejected stream openings (Anna Henningsen) #291227f11465572
] - http2: do not create ArrayBuffers when no DATA received (Anna Henningsen) #291222eb914ff5f
] - http2: only call into JS when necessary for session events (Anna Henningsen) #2912276a7ada15d
] - http2: improve JS-side debug logging (Anna Henningsen) #2912200f153da13
] - http2: improve http2 code a bit (James M Snell) #23984a0a14c809f
] - src: pass along errors from http2 object creation (Anna Henningsen) #25822d85e4006ab
] - test: apply test-http2-max-session-memory-leak from v12.x (Anna Henningsen) #29122v10.16.2
Compare Source
Notable changes
This release patches a regression in the OpenSSL upgrade to 1.1.1c that causes intermittent hangs in machines that have low entropy.
Commits
894a9dd230
] - deps: cherry-pickc19c5a6
from openssl upstream (Ali Ijaz Sheikh) #28983v10.16.1
Compare Source
Notable changes
\_read()
onresume()
(Anna Henningsen) #26965Commits
65ef26fdcb
] - async_hooks: avoid double-destroy HTTPParser (Gerhard Stoebich) #274778f5d6cf5f5
] - deps: update archs files for OpenSSL-1.1.1c (Sam Roberts) #282129e62852724
] - deps: upgrade openssl sources to 1.1.1c (Sam Roberts) #28212c59e0c256d
] - deps: updated openssl upgrade instructions (Sam Roberts) #28212609d2b9ea4
] - deps: V8: backportf27ac28
(Michaël Zasso) #280618f780e8f99
] - deps: cherry-pick88f8fe1
from upstream V8 (Yang Guo) #24514ad588eb5fc
] - doc: adjust TOC margins (Roman Reiss) #28075b3d8a1b1d0
] - doc: add missing changes entry (Ruben Bridgewater) #24758819a647d8f
] - esm: fix esm load bug (ZYSzys) #25491f34bb968c4
] - process: make stdout and stderr emit 'close' on destroy (Matteo Collina) #266910339fba1bb
] - src: handle empty Maybe in uv binding initialize (Anna Henningsen) #25079f9e8e8856a
] - src: fix Get() usage in tls_wrap.cc (cjihrig) #24060b689008dea
] - src: in-source comments and minor TLS cleanups (Sam Roberts) #2571376af23a32b
] - src: remove internalBinding('config').warningFile (Joyee Cheung) #24959b7dbc1c537
] - src: fix warning in cares_wrap.cc (cjihrig) #25230a8f78f02cb
] - src: fulfill Maybe contract in InlineDecoder (Anna Henningsen) #251400dee607409
] - src: extract common Bind method (Jon Moss) #2231508a32fbf57
] - src: elevate v8 namespaces for node_process.cc (Jayasankar) #24578f3841c6750
] - stream: convert existing buffer when calling .setEncoding (Anna Henningsen) #27936274b97c4ea
] - stream: do not unconditionally call\_read()
onresume()
(Anna Henningsen) #26965044e753aaf
] - stream: make _read() be called indefinitely if the user wants so (Matteo Collina) #26135f332265cda
] - test: removeutil.inherits()
usage (ZYSzys) #25245ada0ed55d1
] - test: fix pty test hangs on aix (Ben Noordhuis) #286002ae99160e5
] - test: skip stringbytes-external-exceed-max on AIX (Sam Roberts) #2851639637cb95f
] - test: skip tests related to CI failures on AIX (Sam Roberts) #2846935be08a16f
] - test: clean up build files (Gabriel Schulhof) #28297cc3ca08046
] - test: clearing require cache crashes esm loader (Antoine du HAMEL) #2549175052cadaa
] - tls: add debugging to native TLS code (Anna Henningsen) #2684399dad28ebf
] - tls: add CHECK for impossible condition (Anna Henningsen) #268435ffe04753e
] - tls: renegotiate should take care of its own state (Sam Roberts) #259974a607fab49
] - tools: replace rollup with ncc (Rich Trott) #2481314090b59fc
] - worker: fix nullptr deref after MessagePort deser failure (Anna Henningsen) #25076Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Enabled.
♻️ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.