Stable |
---|
0.12.18 0.12.17 0.12.16 0.12.15 0.12.14 0.12.13 0.12.12 0.12.11 0.12.10 0.12.9 0.12.8 0.12.7 0.12.6 0.12.5 0.12.4 0.12.3 0.12.2 0.12.1 0.12.0 |
Note: Node.js v0.12 is covered by the Node.js Long Term Support Plan and will be maintained until December 31st, 2016.
- npm: upgrade from v2.15.1 to v2.15.11, including accurate updated license (Jeremiah Senkpiel)
- process:
process.versions.ares
now outputs the c-ares version (Johan Bergström)
- [a47fd4549d] - build: add working lint-ci make target (Rod Vagg) #9151
- [830584ca59] - deps: define missing operator delete functions (John Barboza) #10356
- [c130b31cba] - deps: upgrade npm to 2.15.11 (Jeremiah Senkpiel) #9619
- [bc6766d847] - doc: update npm license in main LICENSE file (Rod Vagg) #10352
- [0cdf344c80] - (SEMVER-MINOR) process: reintroduce ares to versions (Johan Bergström) #9191
- [d8e27ec30a] - test: mark dgram-multicast-multi-process as flaky (Rod Vagg) #9150
- [c722335ead] - tls: fix minor jslint failure (Rod Vagg) #9107
This is a security release. All Node.js users should consult the security release summary at https://nodejs.org/en/blog/vulnerability/october-2016-security-releases/ for details on patched vulnerabilities.
- c-ares: fix for single-byte buffer overwrite, CVE-2016-5180, more information at https://c-ares.haxx.se/adv_20160929.html (Daniel Stenberg)
- [c5b095ecf8] - deps: avoid single-byte buffer overwrite (Daniel Stenberg) #8849
This is a security release. All Node.js users should consult the security release summary at https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ for details on patched vulnerabilities.
- buffer: Zero-fill excess bytes in new
Buffer
objects created withBuffer.concat()
while providing atotalLength
parameter that exceeds the total length of the originalBuffer
objects being concatenated. (Сковорода Никита Андреевич) - http:
- CVE-2016-5325 - Properly validate for allowable characters in the
reason
argument inServerResponse#writeHead()
. Fixes a possible response splitting attack vector. This introduces a new case wherethrow
may occur when configuring HTTP responses, users should already be adopting try/catch here. Originally reported independently by Evan Lucas and Romain Gaucher. (Evan Lucas) - Invalid status codes can no longer be sent. Limited to 3 digit numbers between 100 - 999. Lack of proper validation may also serve as a potential response splitting attack vector. Backported from v4.x. (Brian White)
- CVE-2016-5325 - Properly validate for allowable characters in the
- openssl:
- Upgrade to 1.0.1u, fixes a number of defects impacting Node.js: CVE-2016-6304 ("OCSP Status Request extension unbounded memory growth", high severity), CVE-2016-2183, CVE-2016-6303, CVE-2016-2178 and CVE-2016-6306.
- Remove support for loading dynamic third-party engine modules. An attacker may be able to hide malicious code to be inserted into Node.js at runtime by masquerading as one of the dynamic engine modules. Originally reported by Ahmed Zaki (Skype). (Ben Noordhuis, Rod Vagg)
- tls: CVE-2016-7099 - Fix invalid wildcard certificate validation check whereby a TLS server may be able to serve an invalid wildcard certificate for its hostname due to improper validation of
*.
in the wildcard string. Originally reported by Alexander Minozhenko and James Bunton (Atlassian). (Ben Noordhuis)
- [38d7258d89] - buffer: zero-fill uninitialized bytes in .concat() (Сковорода Никита Андреевич) https://github.com/nodejs/node-private/pull/66
- [1ba6d16786] - build: turn on -fno-delete-null-pointer-checks (Ben Noordhuis) #6737
- [71e4285e27] - crypto: don't build hardware engines (Rod Vagg) https://github.com/nodejs/node-private/pull/69
- [b6e0105a66] - deps: add -no_rand_screen to openssl s_client (Shigeki Ohtsu) nodejs/node-v0.x-archive#25368
- [1caec97eab] - deps: fix openssl assembly error on ia32 win32 (Fedor Indutny) nodejs/node-v0.x-archive#25654
- [734bc6938b] - deps: separate sha256/sha512-x86_64.pl for openssl (Shigeki Ohtsu) nodejs/node-v0.x-archive#25654
- [7cc6d4eb5c] - deps: copy all openssl header files to include dir (Shigeki Ohtsu) #8718
- [4a9da21217] - deps: upgrade openssl sources to 1.0.1u (Shigeki Ohtsu) #8718
- [6d977902bd] - http: check reason chars in writeHead (Evan Lucas) https://github.com/nodejs/node-private/pull/47
- [ad470e496b] - http: disallow sending obviously invalid status codes (Evan Lucas) https://github.com/nodejs/node-private/pull/47
- [9dbde2fc88] - lib: make tls.checkServerIdentity() more strict (Ben Noordhuis) https://github.com/nodejs/node-private/pull/61
- [db80592071] - openssl: fix keypress requirement in apps on win32 (Shigeki Ohtsu) nodejs/node-v0.x-archive#25654
This is a security release. All Node.js users should consult the security release summary at https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/ for details on patched vulnerabilities.
- libuv: (CVE-2014-9748) Fixes a bug in the read/write locks implementation for Windows XP and Windows 2003 that can lead to undefined and potentially unsafe behaviour. More information can be found at libuv/libuv#515 or at https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/.
- V8: (CVE-2016-1669) Fixes a potential Buffer overflow vulnerability discovered in V8, more details can be found in the CVE at https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669 or at https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/.
- [da8501edf6] - deps: backport bd1777fd from libuv upstream (Rod Vagg)
- [9207a00f8e] - deps: backport 85adf43e from libuv upstream (Rod Vagg)
- [9627f34230] - deps: backport 98239224 from libuv upstream (Rod Vagg)
- [5df21b2e36] - deps: backport 9a4fd268 from libuv upstream (Rod Vagg)
- [e75de35057] - deps: backport 3eb6764a from libuv upstream (Rod Vagg)
- [a113e02f16] - deps: backport 3a9bfec from v8 upstream (Ben Noordhuis)
- [8138055c88] - test: fix test failure due to expired certificates (Ben Noordhuis) #7195
- npm: Correct erroneous version number in v2.15.1 code (Forrest L Norvell) #5988
- openssl: Upgrade to v1.0.1t, addressing security vulnerabilities (Shigeki Ohtsu) #6553
- Fixes CVE-2016-2107 "Padding oracle in AES-NI CBC MAC check"
- Fixes CVE-2016-2105 "EVP_EncodeUpdate overflow"
- See https://nodejs.org/en/blog/vulnerability/openssl-may-2016/ for full details
- [3e99ee1b47] - deps: completely upgrade npm in LTS to 2.15.1 (Forrest L Norvell) #5988
- [2b63396e1f] - deps: add -no_rand_screen to openssl s_client (Shigeki Ohtsu) nodejs/node-v0.x-archive#25368
- [f21705df58] - deps: update openssl asm files (Shigeki Ohtsu) #6553
- [02b6a6bc27] - deps: fix openssl assembly error on ia32 win32 (Fedor Indutny) nodejs/node-v0.x-archive#25654
- [1aecc668b0] - deps: separate sha256/sha512-x86_64.pl for openssl (Shigeki Ohtsu) nodejs/node-v0.x-archive#25654
- [39380836a0] - deps: copy all openssl header files to include dir (Shigeki Ohtsu) #6553
- [08c8ae44a8] - deps: upgrade openssl sources to 1.0.1t (Shigeki Ohtsu) #6553
- [f5a961ab13] - openssl: fix keypress requirement in apps on win32 (Shigeki Ohtsu) nodejs/node-v0.x-archive#25654
- [810fb211a7] - tools: remove obsolete npm test-legacy command (Kat Marchán) #5988
- npm: Upgrade to v2.15.1. (Forrest L Norvell)
- openssl: OpenSSL v1.0.1s disables the EXPORT and LOW ciphers as they are obsolete and not considered safe. This release of Node.js turns on
OPENSSL_NO_WEAK_SSL_CIPHERS
to fully disable the 27 ciphers included in these lists which can be used in SSLv3 and higher. Full details can be found in our LTS discussion on the matter (nodejs/Release#85). (Shigeki Ohtsu) #5712
- [4041ea6bc5] - deps: upgrade npm in LTS to 2.15.1 (Forrest L Norvell)
- [a115779026] - deps: Disable EXPORT and LOW ciphers in openssl (Shigeki Ohtsu) #5712
- [ab907eb5a8] - test: skip cluster-disconnect-race on Windows (Gibson Fahnestock) #5621
- [9c06db7444] - test: change tls tests not to use LOW cipher (Shigeki Ohtsu) #5712
- [154098a3dc] - test: bp fix for test-http-get-pipeline-problem.js (Michael Dawson) #3013
- [ff2bed6e86] - win,build: support Visual C++ Build Tools 2015 (João Reis) #5627
- openssl: Fully remove SSLv2 support, the
--enable-ssl2
command line argument will now produce an error. The DROWN Attack (https://drownattack.com/) creates a vulnerability where SSLv2 is enabled by a server, even if a client connection is not using SSLv2. The SSLv2 protocol is widely considered unacceptably broken and should not be supported. More information is available at https://www.openssl.org/news/vulnerabilities.html#2016-0800
Note that the upgrade to OpenSSL 1.0.1s in Node.js v0.12.11 removed internal SSLv2 support. The change in this release was originally intended for v0.12.11. The --enable-ssl2
command line argument now produces an error rather than being a no-op.
- [dbfc9d9241] - crypto,tls: remove SSLv2 support (Ben Noordhuis) #5536
- http_parser: Update to http-parser 2.3.2 to fix an unintentionally strict limitation of allowable header characters. (James M Snell) #5241
- domains:
- Prevent an exit due to an exception being thrown rather than emitting an 'uncaughtException' event on the
process
object when no error handler is set on the domain within which an error is thrown and an 'uncaughtException' event listener is set onprocess
. (Julien Gilli) #3885 - Fix an issue where the process would not abort in the proper function call if an error is thrown within a domain with no error handler and
--abort-on-uncaught-exception
is used. (Julien Gilli) #3885
- Prevent an exit due to an exception being thrown rather than emitting an 'uncaughtException' event on the
- openssl: Upgrade from 1.0.1r to 1.0.1s (Ben Noordhuis) #5509
- Fix a double-free defect in parsing malformed DSA keys that may potentially be used for DoS or memory corruption attacks. It is likely to be very difficult to use this defect for a practical attack and is therefore considered low severity for Node.js users. More info is available at https://www.openssl.org/news/vulnerabilities.html#2016-0705
- Fix a defect that can cause memory corruption in certain very rare cases relating to the internal
BN_hex2bn()
andBN_dec2bn()
functions. It is believed that Node.js is not invoking the code paths that use these functions so practical attacks via Node.js using this defect are unlikely to be possible. More info is available at https://www.openssl.org/news/vulnerabilities.html#2016-0797 - Fix a defect that makes the CacheBleed Attack (https://ssrg.nicta.com.au/projects/TS/cachebleed/) possible. This defect enables attackers to execute side-channel attacks leading to the potential recovery of entire RSA private keys. It only affects the Intel Sandy Bridge (and possibly older) microarchitecture when using hyper-threading. Newer microarchitectures, including Haswell, are unaffected. More info is available at https://www.openssl.org/news/vulnerabilities.html#2016-0702
- [1ab6653db9] - build: update Node.js logo on OSX installer (Rod Vagg) #5401
- [fcc64792ae] - child_process: guard against race condition (Rich Trott) #5153
- [6c468df9af] - child_process: fix data loss with readable event (Brian White) #5037
- [61a22019c2] - deps: upgrade openssl to 1.0.1s (Ben Noordhuis) #5509
- [fa26b13df7] - deps: update to http-parser 2.3.2 (James M Snell) #5241
- [46c8e2165f] - deps: backport 1f8555 from v8's upstream (Trevor Norris) #3945
- [ce58c2c31a] - doc: remove SSLv2 descriptions (Shigeki Ohtsu) #5541
- [018e4e0b1a] - domains: fix handling of uncaught exceptions (Julien Gilli) #3885
- [d421e85dc9] - lib: fix cluster handle leak (Rich Trott) #5152
- [3a48f0022f] - node: fix leaking Context handle (Trevor Norris) #3945
- [28dddabf6a] - src: fix build error without OpenSSL support (Jörg Krause) #4201
- [a79baf03cd] - src: use global SealHandleScope (Trevor Norris) #3945
- [be39f30447] - test: add test-domain-exit-dispose-again back (Julien Gilli) #4278
- [da66166b9a] - test: fix test-domain-exit-dispose-again (Julien Gilli) #3991
This is an important security release. All Node.js users should consult the security release summary at nodejs.org for details on patched vulnerabilities.
- http: fix defects in HTTP header parsing for requests and responses that can allow request smuggling (CVE-2016-2086) or response splitting (CVE-2016-2216). HTTP header parsing now aligns more closely with the HTTP spec including restricting the acceptable characters.
- http-parser: upgrade from 2.3.0 to 2.3.1
- openssl: upgrade from 1.0.1q to 1.0.1r. To mitigate against the Logjam attack, TLS clients now reject Diffie-Hellman handshakes with parameters shorter than 1024-bits, up from the previous limit of 768-bits.
- src:
- introduce new
--security-revert={cvenum}
command line flag for selective reversion of specific CVE fixes - allow the fix for CVE-2016-2216 to be selectively reverted using
--security-revert=CVE-2016-2216
- introduce new
- build:
- xz compressed tar files will be made available from nodejs.org for v0.12 builds from v0.12.10 onward
- A headers.tar.gz file will be made available from nodejs.org for v0.12 builds from v0.12.10 onward, a future change to node-gyp will be required to make use of these
- [4312848bff] - build: enable xz compressed tarballs where possible (Rod Vagg) #4894
- [247626245c] - deps: upgrade openssl sources to 1.0.1r (Shigeki Ohtsu) nodejs/node-v0.x-archive#25368
- [744c9749fc] - deps: update http-parser to version 2.3.1 (James M Snell)
- [d1c56ec7d1] - doc: clarify v0.12.9 notable items (Rod Vagg) #4154
- [e128d9a5b4] - http: strictly forbid invalid characters from headers (James M Snell)
- [bdb9f2cf89] - src: avoiding compiler warnings in node_revert.cc (James M Snell)
- [23bced1fb3] - src: add --security-revert command line flag (James M Snell)
- [f41a3c73e7] - tools: backport tools/install.py for headers (Richard Lau) #4149
Security Update
- http: Fix CVE-2015-8027, a bug whereby an HTTP socket may no longer have a parser associated with it but a pipelined request attempts to trigger a pause or resume on the non-existent parser, a potential denial-of-service vulnerability. (Fedor Indutny)
- openssl: Upgrade to 1.0.1q, fixes CVE-2015-3194 "Certificate verify crash with missing PSS parameter", a potential denial-of-service vector for Node.js TLS servers using client certificate authentication; TLS clients are also impacted. Details are available at http://openssl.org/news/secadv/20151203.txt. (Ben Noordhuis) #4133
- [8d24a14f2c] - deps: upgrade to openssl 1.0.1q (Ben Noordhuis) #4133
- [dfc6f4a9af] - http: fix pipeline regression (Fedor Indutny)
- [d9399569bd] - build: backport tools/release.sh (Rod Vagg) #3642
- [78c5b4c8bd] - build: backport config for new CI infrastructure (Rod Vagg) #3642
- [83441616a5] - build: fix --without-ssl compile time error (Ben Noordhuis) #3825
- [8887666b0b] - build: update manifest to include Windows 10 (Lucien Greathouse) #2843
- [08afe4ec8e] - build: add MSVS 2015 support (Rod Vagg) #2843
- [4f2456369c] - build: work around VS2015 issue in ICU <56 (Steven R. Loomis) nodejs/node-v0.x-archive#25804
- [15030f26fd] - build: Intl: bump ICU4C from 54 to 55 (backport) (Steven R. Loomis) nodejs/node-v0.x-archive#25856
- [1083fa70f0] - build: run-ci makefile rule (Alexis Campailla) nodejs/node-v0.x-archive#25653
- [2d2494cf14] - build: support flaky tests in test-ci (Alexis Campailla) nodejs/node-v0.x-archive#25653
- [b25d26f2ef] - build: support Jenkins via test-ci (Alexis Campailla) nodejs/node-v0.x-archive#25653
- [7e4b47f38a] - build,win: fix node.exe resource version (João Reis) #3053
- [e07c86e240] - build,win: try next MSVS version on failure (João Reis) #2843
- [b5a0abcfdf] - child_process: clone spawn options argument (cjihrig) nodejs/node-v0.x-archive#9159
- [8b81f98c41] - configure: add --without-mdb flag (cgalibern) nodejs/node-v0.x-archive#25707
- [071c860c2b] - crypto: replace rwlocks with simple mutexes (Ben Noordhuis) #2723
- [ca97fb6be3] - deps: upgrade npm to 2.14.9 (Forrest L Norvell) #3684
- [583734342e] - deps: fix openssl for MSVS 2015 (Andy Polyakov) #2843
- [02c262a4c6] - deps: fix gyp to work on MacOSX without XCode (Shigeki Ohtsu) #2843
- [f0fba0bce8] - deps: update gyp to 25ed9ac (João Reis) #2843
- [f693565813] - deps: upgrade to npm 2.13.4 (Kat Marchán) nodejs/node-v0.x-archive#25825
- [618b142679] - deps,v8: fix compilation in VS2015 (João Reis) #2843
- [49b4f0d54e] - doc: backport README.md (Rod Vagg) #3642
- [2860c53562] - doc: fixed child_process.exec doc (Tyler Anton) nodejs/node-v0.x-archive#14088
- [4a91fa11a3] - doc: Update docs for os.platform() (George Kotchlamazashvili) nodejs/node-v0.x-archive#25777
- [b03ab02fe8] - doc: Change the link for v8 docs to v8dox.com (Chad Walker) nodejs/node-v0.x-archive#25811
- [1fd8f37efd] - doc: buffer, adding missing backtick (Dyana Rose) nodejs/node-v0.x-archive#25811
- [162d0db3bb] - doc: tls.markdown, adjust version from v0.10.39 to v0.10.x (James M Snell) nodejs/node-v0.x-archive#25591
- [eda2560cdc] - doc: additional refinement to readable event (James M Snell) nodejs/node-v0.x-archive#25591
- [881d9bea01] - doc: readable event clarification (James M Snell) nodejs/node-v0.x-archive#25591
- [b6378f0c75] - doc: stream.unshift does not reset reading state (James M Snell) nodejs/node-v0.x-archive#25591
- [4952e2b4d2] - doc: clarify Readable._read and Readable.push (fresheneesz) nodejs/node-v0.x-archive#25591
- [14000b97d4] - doc: two minor stream doc improvements (James M Snell) nodejs/node-v0.x-archive#25591
- [6b6bd21497] - doc: Clarified read method with specified size argument. (Philippe Laferriere) nodejs/node-v0.x-archive#25591
- [16f547600a] - doc: Document http.request protocol option (Ville Skyttä) nodejs/node-v0.x-archive#25591
- [618e4ecda9] - doc: add a note about readable in flowing mode (James M Snell) nodejs/node-v0.x-archive#25591
- [0b165be37b] - doc: fix line wrapping in buffer.markdown (James M Snell) nodejs/node-v0.x-archive#25591
- [70dd13f88d] - doc: add CleartextStream deprecation notice (James M Snell) nodejs/node-v0.x-archive#25591
- [418cde0765] - doc: mention that mode is ignored if file exists (James M Snell) nodejs/node-v0.x-archive#25591
- [85bcb281e4] - doc: improve http.abort description (James M Snell) nodejs/node-v0.x-archive#25591
- [5ccb429ee8] - doc, comments: Grammar and spelling fixes (Ville Skyttä) nodejs/node-v0.x-archive#25591
- [a24db43101] - docs: event emitter behavior notice (Samuel Mills (Henchman)) nodejs/node-v0.x-archive#25467
- [8cbf7cb021] - docs: events clarify emitter.listener() behavior (Benjamin Steephenson) nodejs/node-v0.x-archive#25591
- [b7229debbe] - docs: Fix default options for fs.createWriteStream() (Chris Neave) nodejs/node-v0.x-archive#25591
- [f0453caea2] - domains: port caeb677 from v0.10 to v0.12 (Jeremy Whitlock) nodejs/node-v0.x-archive#25835
- [261fa3620f] - src: fix intermittent SIGSEGV in resolveTxt (Evan Lucas) nodejs/node-v0.x-archive#9300
- [1f7257b02d] - test: mark test-https-aws-ssl flaky on linux (João Reis) nodejs/node-v0.x-archive#25893
- [cf435d55db] - test: mark test-signal-unregister as flaky (Alexis Campailla) nodejs/node-v0.x-archive#25750
- [ceb6a8c131] - test: fix test-debug-port-from-cmdline (João Reis) nodejs/node-v0.x-archive#25748
- [22997731e6] - test: add regression test for #25735 (Fedor Indutny) nodejs/node-v0.x-archive#25739
- [39e05639f4] - test: mark http-pipeline-flood flaky on win32 (Julien Gilli) nodejs/node-v0.x-archive#25707
- [78d256e7f5] - test: unmark tests that are no longer flaky (João Reis) nodejs/node-v0.x-archive#25676
- [a9b642cf5b] - test: runner should return 0 on flaky tests (Alexis Campailla) nodejs/node-v0.x-archive#25653
- [b48639befd] - test: support writing test output to file (Alexis Campailla) nodejs/node-v0.x-archive#25653
- [caa16b41d6] - (SEMVER-MINOR) tls: prevent server from using dhe keys < 768 (Michael Dawson) #3890
- [0363cf4a80] - tls: Closing parent socket also closes the tls sock (Devin Nakamura) nodejs/node-v0.x-archive#25642
- [75697112e8] - tls: do not hang without
newSession
handler (Fedor Indutny) nodejs/node-v0.x-archive#25739 - [d998a65058] - tools: pass constant to logger instead of string (Johan Bergström) nodejs/node-v0.x-archive#25653
- [1982ed6e63] - v8: port fbff705 from v0.10 to v0.12 (Jeremy Whitlock) nodejs/node-v0.x-archive#25835
- [44d7054252] - win: fix custom actions for WiX older than 3.9 (João Reis) #2843
- [586c4d8b8e] - win: fix custom actions on Visual Studio != 2013 (Julien Gilli) #2843
- [14db629497] - win,msi: correct installation path registry keys (João Reis) nodejs/node-v0.x-archive#25640
- [8e80528453] - win,msi: change InstallScope to perMachine (João Reis) nodejs/node-v0.x-archive#25640
- [35bbe98401] - Update addons.markdown (Max Deepfield) nodejs/node-v0.x-archive#25885
- [9a6f1ce416] - comma (Julien Valéry) nodejs/node-v0.x-archive#25811
- [d384bf8f84] - Update assert.markdown (daveboivin) nodejs/node-v0.x-archive#25811
- [89b22ccbe1] - Fixed typo (Andrew Murray) nodejs/node-v0.x-archive#25811
- [5ad05af380] - Update util.markdown (Daniel Rentz) nodejs/node-v0.x-archive#25591
- [cb660ab3d3] - Update child_process.markdown, spelling (Jared Fox) nodejs/node-v0.x-archive#25591
- [59c67fe3cd] - updated documentation for fs.createReadStream (Michele Caini) nodejs/node-v0.x-archive#25591
- [53b6a615a5] - Documentation update about Buffer initialization (Sarath) nodejs/node-v0.x-archive#25591
- [b8d47a7b6f] - fix (Fedor Indutny) nodejs/node-v0.x-archive#25739
- [
0cf9f27703
] - deps: upgrade openssl sources to 1.0.1p #25654 - [
8917e430b8
] - deps: upgrade to npm 2.11.3 #25545 - [
88a27a9621
] - V8: cherry-pick JitCodeEvent patch from upstream (Ben Noordhuis) #25589 - [
18d413d299
] - win,msi: create npm folder in AppData directory (Steven Rockarts) #8838
- deps: Fixed an out-of-band write in utf8 decoder. This is an important security update as it can be used to cause a denial of service attack.
- [
78b0e30954
] - deps: fix out-of-band write in utf8 decoder (Fedor Indutny)
- [
456c22f63f
] - openssl: upgrade to 1.0.1o (Addressing multiple CVEs) #25523 - [
20d8db1a42
] - npm: upgrade to 2.11.2 #25517 - [
50f961596d
] - uv: upgrade to 1.6.1 #25475 - [
b81a643f9a
] - V8: avoid deadlock when profiling is active (Dmitri Melikyan) #25309 - [
9d19dfbfdb
] - install: fix source path for openssl headers (Oguz Bastemur) #14089 - [
4028669531
] - install: make sure opensslconf.h is overwritten (Oguz Bastemur) #14089 - [
d38e865fce
] - timers: fix timeout when added in timer's callback (Julien Gilli) #17203 - [
e7c84f82c7
] - windows: broadcast WM_SETTINGCHANGE after install (Mathias Küsel) #25100
- [
202c18bbc3
] - npm: upgrade to 2.10.1 #25364 - [
6157697bd5
] - V8: revert v8 Array.prototype.values() removal (cjihrig) #25328 - [
3122052890
] - win: bring back xp/2k3 support (Bert Belder) #25367
- [
32166a90cf
] - V8: update to 3.28.71.19 #18206 - [
84f1ab6114
] - uv: upgrade to 1.5.0 #25141 - [
03cfbd65fb
] - npm: upgrade to 2.9.1 #25289 - [
80cdae855f
] - V8: don't busy loop in v8 cpu profiler thread (Mike Tunnicliffe) #25268 - [
2a5f4bd7ce
] - V8: fix issue with let bindings in for loops (adamk) #23948 - [
f0ef597e09
] - debugger: don't spawn child process in remote mode (Jackson Tian) #14172 - [
0e392f3b68
] - net: do not set V4MAPPED on FreeBSD (Julien Gilli) #18204 - [
101e103e3b
] - repl: make 'Unexpected token' errors recoverable (Julien Gilli) #8875 - [
d5b32246fb
] - src: backport ignore ENOTCONN on shutdown race (Ben Noordhuis) #14480 - [
f99eaefe75
] - src: fix backport of SIGINT crash fix on FreeBSD (Julien Gilli) #14819
- [
7a37910f25
] - uv: Upgrade to 1.4.2 #9179 - [
2704c62933
] - npm: Upgrade to 2.7.4 #14180 - [
a103712a62
] - V8: do not add extra newline in log file (Julien Gilli) - [
2fc5eeb3da
] - V8: Fix --max_old_space_size=4096 integer overflow (Andrei Sedoi) #9200 - [
605329d7f7
] - asyncwrap: fix constructor condition for early ret (Trevor Norris) #9146 - [
a33f23cbbc
] - buffer: align chunks on 8-byte boundary (Fedor Indutny) #9375 - [
a35ba2f67d
] - buffer: fix pool offset adjustment (Trevor Norris) - [
c0766eb1a4
] - build: fix use of strict aliasing (Trevor Norris) #9179 - [
6c3647c38d
] - console: allow Object.prototype fields as labels (Colin Ihrig) #9116 - [
4823afcbe2
] - fs: make F_OK/R_OK/W_OK/X_OK not writable (Jackson Tian) #9060 - [
b3aa876f08
] - fs: properly handle fd passed to truncate() (Bruno Jouhier) #9161 - [
d6484f3f7b
] - http: fix assert on data/end after socket error (Fedor Indutny) #14087 - [
04b63e022a
] - lib: fix max size check in Buffer constructor (Ben Noordhuis) #657 - [
2411bea0df
] - lib: fix stdio/ipc sync i/o regression (Ben Noordhuis) #9179 - [
b8604fa480
] - module: replace NativeModule.require (Herbert Vojčík) #9201 - [
1a2a4dac23
] - net: allow port 0 in connect() (cjihrig) #9268 - [
bada87bd66
] - net: unref timer in parent sockets (Fedor Indutny) #891 - [
c66f8c21f0
] - path: refactor for performance and consistency (Nathan Woltman) #9289 - [
9deade4322
] - smalloc: extend user API (Trevor Norris) #905 - [
61fe1fe21b
] - src: fix for SIGINT crash on FreeBSD (Fedor Indutny) #14184 - [
b233131901
] - src: fix builtin modules failing with --use-strict (Julien Gilli) #9237 - [
7e9d2f8de8
] - watchdog: fix timeout for early polling return (Saúl Ibarra Corretgé) #9410
- [
3b511a8ccd
] - openssl: upgrade to 1.0.1m (Addressing multiple CVES)
- [
087a7519ce
] - npm: Upgrade to 2.5.1 - [
4312f8d760
] - mdb_v8: update for v0.12 (Dave Pacheco)