This is a security release.
The following CVEs are fixed in this release:
- CVE-2023-23918: Node.js Permissions policies can be bypassed via process.mainModule (High)
- CVE-2023-23920: Node.js insecure loading of ICU data through ICU_DATA environment variable (Low)
More detailed information on each of the vulnerabilities can be found in February 2023 Security Releases blog post.
This security release includes OpenSSL security updates as outlined in the recent
OpenSSL security advisory.
This security release also includes an npm update for Node.js 14 to address a number
of CVEs which either do not affect Node.js or are low severity in the context of Node.js. You
can get more details for the individual CVEs in
97a0443f13] - build: build ICU with ICU_NO_USER_DATA_OVERRIDE (RafaelGSS) nodejs-private/node-private#374
9e6221529b] - deps: cherry-pick Windows ARM64 fix for openssl (Richard Lau) #46566
0d5f86451d] - deps: update archs files for OpenSSL-1.1.1t (RafaelGSS) #46566
8c11d17b40] - deps: upgrade openssl sources to 1.1.1t (RafaelGSS) #46566
224e93c9ef] - deps: upgrade npm to 6.14.18 (Ruy Adorno) #45936
d73ea4de13] - doc: clarify release notes for Node.js 14.21.2 (Richard Lau) #45846
f7892c16be] - lib: makeRequireFunction patch when experimental policy (RafaelGSS) nodejs-private/node-private#358
fa115ee8ac] - module: protect against prototype mutation (Antoine du Hamel) #44007
83975b7fb4] - policy: makeRequireFunction on mainModule.require (RafaelGSS) nodejs-private/node-private#358
a5f8798d7a] - test: avoid left behind child processes (Richard Lau) #46276
- 🔍View and search all Node.js releases.
- 🛠️Create and share lists to track your tools.
- 🚨Setup notifications for major, security, feature or patch updates.
- 🚀Much more coming soon!