Skip to content
This repository was archived by the owner on Oct 15, 2020. It is now read-only.

Commit aa4f174

Browse files
committed
meta: merge node/master into node-chakracore/master
Merge 7d18e92 as of 2018-11-28 This commit was automatically generated. For any problems, please contact jackhorton Reviewed-By: Taylor Woll <tawoll@ntdev.microsoft.com>
2 parents fbd5713 + 7d18e92 commit aa4f174

31 files changed

+668
-64
lines changed

CHANGELOG.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,14 @@ release.
2828
</tr>
2929
<tr>
3030
<td valign="top">
31-
<b><a href="doc/changelogs/CHANGELOG_V11.md#11.2.0">11.2.0</a></b><br/>
31+
<b><a href="doc/changelogs/CHANGELOG_V11.md#11.3.0">11.3.0</a></b><br/>
32+
<a href="doc/changelogs/CHANGELOG_V11.md#11.2.0">11.2.0</a><br/>
3233
<a href="doc/changelogs/CHANGELOG_V11.md#11.1.0">11.1.0</a><br/>
3334
<a href="doc/changelogs/CHANGELOG_V11.md#11.0.0">11.0.0</a><br/>
3435
</td>
3536
<td valign="top">
36-
<b><a href="doc/changelogs/CHANGELOG_V10.md#10.13.0">10.13.0</a></b><br/>
37+
<b><a href="doc/changelogs/CHANGELOG_V10.md#10.14.0">10.14.0</a></b><br/>
38+
<a href="doc/changelogs/CHANGELOG_V10.md#10.13.0">10.13.0</a><br/>
3739
<a href="doc/changelogs/CHANGELOG_V10.md#10.12.0">10.12.0</a><br/>
3840
<a href="doc/changelogs/CHANGELOG_V10.md#10.11.0">10.11.0</a><br/>
3941
<a href="doc/changelogs/CHANGELOG_V10.md#10.10.0">10.10.0</a><br/>
@@ -51,7 +53,8 @@ release.
5153
<a href="doc/changelogs/CHANGELOG_V10.md#10.0.0">10.0.0</a><br/>
5254
</td>
5355
<td valign="top">
54-
<b><a href="doc/changelogs/CHANGELOG_V8.md#8.13.0">8.13.0</a></b><br/>
56+
<b><a href="doc/changelogs/CHANGELOG_V8.md#8.14.0">8.14.0</a><br/>
57+
<a href="doc/changelogs/CHANGELOG_V8.md#8.13.0">8.13.0</a></b><br/>
5558
<a href="doc/changelogs/CHANGELOG_V8.md#8.12.0">8.12.0</a><br/>
5659
<a href="doc/changelogs/CHANGELOG_V8.md#8.11.4">8.11.4</a><br/>
5760
<a href="doc/changelogs/CHANGELOG_V8.md#8.11.3">8.11.3</a><br/>
@@ -81,7 +84,8 @@ release.
8184
<a href="doc/changelogs/CHANGELOG_V8.md#8.0.0">8.0.0</a><br/>
8285
</td>
8386
<td valign="top">
84-
<b><a href="doc/changelogs/CHANGELOG_V6.md#6.14.4">6.14.4</a></b><br/>
87+
<b><a href="doc/changelogs/CHANGELOG_V6.md#6.15.0">6.15.0</a></b><br/>
88+
<a href="doc/changelogs/CHANGELOG_V6.md#6.14.4">6.14.4</a><br/>
8589
<a href="doc/changelogs/CHANGELOG_V6.md#6.14.3">6.14.3</a><br/>
8690
<a href="doc/changelogs/CHANGELOG_V6.md#6.14.2">6.14.2</a><br/>
8791
<a href="doc/changelogs/CHANGELOG_V6.md#6.14.1">6.14.1</a><br/>

COLLABORATOR_GUIDE.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -93,12 +93,10 @@ to land but is [author ready](#author-ready-pull-requests), add the
9393

9494
## Accepting Modifications
9595

96-
All modifications to the Node.js code and documentation should be performed via
97-
GitHub pull requests, including modifications by Collaborators and TSC members.
98-
A pull request must be reviewed, and must also be tested with CI, before being
99-
landed into the codebase. There may be exceptions to the latter (the changed
100-
code cannot be tested with a CI or similar). If that is the case, please leave a
101-
comment that explains why the PR does not require a CI run.
96+
Contributors propose modifications to Node.js using GitHub pull requests. This
97+
is true for all modifications including those proposed by TSC members and other
98+
Collaborators. A pull request must pass code review and CI before landing into
99+
the codebase.
102100

103101
### Code Reviews
104102

deps/http_parser/http_parser.gyp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@
5656
'defines': [ 'HTTP_PARSER_STRICT=0' ],
5757
'include_dirs': [ '.' ],
5858
},
59-
'defines': [ 'HTTP_PARSER_STRICT=0' ],
59+
'defines': [ 'HTTP_MAX_HEADER_SIZE=8192', 'HTTP_PARSER_STRICT=0' ],
6060
'sources': [ './http_parser.c', ],
6161
'conditions': [
6262
['OS=="win"', {
@@ -79,7 +79,7 @@
7979
'defines': [ 'HTTP_PARSER_STRICT=1' ],
8080
'include_dirs': [ '.' ],
8181
},
82-
'defines': [ 'HTTP_PARSER_STRICT=1' ],
82+
'defines': [ 'HTTP_MAX_HEADER_SIZE=8192', 'HTTP_PARSER_STRICT=1' ],
8383
'sources': [ './http_parser.c', ],
8484
'conditions': [
8585
['OS=="win"', {

doc/api/fs.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3528,6 +3528,13 @@ On Linux, positional writes don't work when the file is opened in append mode.
35283528
The kernel ignores the position argument and always appends the data to
35293529
the end of the file.
35303530

3531+
On Windows, if the file descriptor is connected to the console (e.g. `fd == 1`
3532+
or `stdout`) a string containing non-ASCII characters will not be rendered
3533+
properly by default, regardless of the encoding used.
3534+
It is possible to configure the console to render UTF-8 properly by changing the
3535+
active codepage with the `chcp 65001` command. See the [chcp][] docs for more
3536+
details.
3537+
35313538
## fs.writeFile(file, data[, options], callback)
35323539
<!-- YAML
35333540
added: v0.1.29
@@ -4926,3 +4933,4 @@ the file contents.
49264933
[MSDN-Using-Streams]: https://docs.microsoft.com/en-us/windows/desktop/FileIO/using-streams
49274934
[support of file system `flags`]: #fs_file_system_flags
49284935
[File Access Constants]: #fs_file_access_constants
4936+
[chcp]: https://ss64.com/nt/chcp.html

doc/api/http.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -958,6 +958,26 @@ added: v0.7.0
958958

959959
Limits maximum incoming headers count. If set to 0, no limit will be applied.
960960

961+
### server.headersTimeout
962+
<!-- YAML
963+
added: v11.3.0
964+
-->
965+
966+
* {number} **Default:** `40000`
967+
968+
Limit the amount of time the parser will wait to receive the complete HTTP
969+
headers.
970+
971+
In case of inactivity, the rules defined in [server.timeout][] apply. However,
972+
that inactivity based timeout would still allow the connection to be kept open
973+
if the headers are being sent very slowly (by default, up to a byte per 2
974+
minutes). In order to prevent this, whenever header data arrives an additional
975+
check is made that more than `server.headersTimeout` milliseconds has not
976+
passed since the connection was established. If the check fails, a `'timeout'`
977+
event is emitted on the server object, and (by default) the socket is destroyed.
978+
See [server.timeout][] for more information on how timeout behaviour can be
979+
customised.
980+
961981
### server.setTimeout([msecs][, callback])
962982
<!-- YAML
963983
added: v0.9.12

doc/api/https.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,12 @@ This method is identical to [`server.listen()`][] from [`net.Server`][].
4444

4545
See [`http.Server#maxHeadersCount`][].
4646

47+
### server.headersTimeout
48+
49+
- {number} **Default:** `40000`
50+
51+
See [`http.Server#headersTimeout`][].
52+
4753
### server.setTimeout([msecs][, callback])
4854
<!-- YAML
4955
added: v0.11.2
@@ -363,6 +369,7 @@ headers: max-age=0; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; p
363369
[`http.Agent`]: http.html#http_class_http_agent
364370
[`http.Server#keepAliveTimeout`]: http.html#http_server_keepalivetimeout
365371
[`http.Server#maxHeadersCount`]: http.html#http_server_maxheaderscount
372+
[`http.Server#headersTimeout`]: http.html#http_server_headerstimeout
366373
[`http.Server#setTimeout()`]: http.html#http_server_settimeout_msecs_callback
367374
[`http.Server#timeout`]: http.html#http_server_timeout
368375
[`http.Server`]: http.html#http_class_http_server

doc/changelogs/CHANGELOG_V10.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
</tr>
1111
<tr>
1212
<td valign="top">
13+
<a href="#10.14.0">10.14.0</a><br/>
1314
<a href="#10.13.0">10.13.0</a><br/>
1415
</td>
1516
<td valign="top">
@@ -45,6 +46,41 @@
4546
* [io.js](CHANGELOG_IOJS.md)
4647
* [Archive](CHANGELOG_ARCHIVE.md)
4748

49+
<a id="10.14.0"></a>
50+
## 2018-11-27, Version 10.14.0 'Dubnium' (LTS), @rvagg
51+
52+
This is a security release. All Node.js users should consult the security release summary at:
53+
54+
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
55+
56+
for details on patched vulnerabilities.
57+
58+
Fixes for the following CVEs are included in this release:
59+
60+
* Node.js: Denial of Service with large HTTP headers (CVE-2018-12121)
61+
* Node.js: Slowloris HTTP Denial of Service (CVE-2018-12122 / Node.js)
62+
* Node.js: Hostname spoofing in URL parser for javascript protocol (CVE-2018-12123)
63+
* OpenSSL: Timing vulnerability in DSA signature generation (CVE-2018-0734)
64+
* OpenSSL: Timing vulnerability in ECDSA signature generation (CVE-2019-0735)
65+
66+
### Notable Changes
67+
68+
* **deps**: Upgrade to OpenSSL 1.1.0j, fixing CVE-2018-0734 and CVE-2019-0735
69+
* **http**:
70+
* Headers received by HTTP servers must not exceed 8192 bytes in total to prevent possible Denial of Service attacks. Reported by Trevor Norris. (CVE-2018-12121 / Matteo Collina)
71+
* A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with `server.headersTimeout`. Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with `server.setTimeout()`, this aids in protecting against excessive resource retention and possible Denial of Service. Reported by Jan Maybach ([liebdich.com](https://liebdich.com)). (CVE-2018-12122 / Matteo Collina)
72+
* **url**: Fix a bug that would allow a hostname being spoofed when parsing URLs with `url.parse()` with the `'javascript:'` protocol. Reported by [Martin Bajanik](https://twitter.com/_bayotop) ([Kentico](https://kenticocloud.com/)). (CVE-2018-12123 / Matteo Collina)
73+
74+
### Commits
75+
76+
* [[`38ca8baf81`](https://github.com/nodejs/node/commit/38ca8baf81)] - **deps**: update openssl 1.1.0 upgrade docs (Sam Roberts) [#24523](https://github.com/nodejs/node/pull/24523)
77+
* [[`241ba81a5b`](https://github.com/nodejs/node/commit/241ba81a5b)] - **deps**: update archs files for OpenSSL-1.1.0 (Sam Roberts) [#24523](https://github.com/nodejs/node/pull/24523)
78+
* [[`acc40efa90`](https://github.com/nodejs/node/commit/acc40efa90)] - **deps**: add s390 asm rules for OpenSSL-1.1.0 (Shigeki Ohtsu) [#24523](https://github.com/nodejs/node/pull/24523)
79+
* [[`7efd184bb1`](https://github.com/nodejs/node/commit/7efd184bb1)] - **deps**: upgrade openssl sources to 1.1.0j (Sam Roberts) [#24523](https://github.com/nodejs/node/pull/24523)
80+
* [[`a8532d4d23`](https://github.com/nodejs/node/commit/a8532d4d23)] - **deps,http**: http\_parser set max header size to 8KB (Matteo Collina) [nodejs-private/node-private#143](https://github.com/nodejs-private/node-private/pull/143)
81+
* [[`eb43bc04b1`](https://github.com/nodejs/node/commit/eb43bc04b1)] - **(SEMVER-MINOR)** **http,https**: protect against slow headers attack (Matteo Collina) [nodejs-private/node-private#150](https://github.com/nodejs-private/node-private/pull/150)
82+
* [[`8b1405ee01`](https://github.com/nodejs/node/commit/8b1405ee01)] - **url**: avoid hostname spoofing w/ javascript protocol (Matteo Collina) [nodejs-private/node-private#145](https://github.com/nodejs-private/node-private/pull/145)
83+
4884
<a id="10.13.0"></a>
4985
## 2018-10-30, Version 10.13.0 'Dubnium' (LTS), @MylesBorins
5086

doc/changelogs/CHANGELOG_V11.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
</tr>
1010
<tr>
1111
<td>
12+
<a href="#11.3.0">11.3.0</a><br/>
1213
<a href="#11.2.0">11.2.0</a><br/>
1314
<a href="#11.1.0">11.1.0</a><br/>
1415
<a href="#11.0.0">11.0.0</a><br/>
@@ -29,6 +30,44 @@
2930
* [io.js](CHANGELOG_IOJS.md)
3031
* [Archive](CHANGELOG_ARCHIVE.md)
3132

33+
<a id="11.3.0"></a>
34+
## 2018-11-27, Version 11.3.0 (Current), @rvagg
35+
36+
This is a security release. All Node.js users should consult the security release summary at:
37+
38+
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
39+
40+
for details on patched vulnerabilities.
41+
42+
Fixes for the following CVEs are included in this release:
43+
44+
* Node.js: Denial of Service with large HTTP headers (CVE-2018-12121)
45+
* Node.js: Slowloris HTTP Denial of Service (CVE-2018-12122 / Node.js)
46+
* Node.js: Hostname spoofing in URL parser for javascript protocol (CVE-2018-12123)
47+
* OpenSSL: Timing vulnerability in DSA signature generation (CVE-2018-0734)
48+
* OpenSSL: Timing vulnerability in ECDSA signature generation (CVE-2019-0735)
49+
50+
### Notable Changes
51+
52+
* **deps**: Upgrade to OpenSSL 1.1.0j, fixing CVE-2018-0734 and CVE-2019-0735
53+
* **http**:
54+
* Headers received by HTTP servers must not exceed 8192 bytes in total to prevent possible Denial of Service attacks. Reported by Trevor Norris. (CVE-2018-12121 / Matteo Collina)
55+
* A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with `server.headersTimeout`. Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with `server.setTimeout()`, this aids in protecting against excessive resource retention and possible Denial of Service. Reported by Jan Maybach ([liebdich.com](https://liebdich.com)). (CVE-2018-12122 / Matteo Collina)
56+
* **url**: Fix a bug that would allow a hostname being spoofed when parsing URLs with `url.parse()` with the `'javascript:'` protocol. Reported by [Martin Bajanik](https://twitter.com/_bayotop) ([Kentico](https://kenticocloud.com/)). (CVE-2018-12123 / Matteo Collina)
57+
58+
### Commits
59+
60+
* [[`8f191f3759`](https://github.com/nodejs/node/commit/8f191f3759)] - **deps**: update openssl 1.1.0 upgrade docs (Sam Roberts) [#24523](https://github.com/nodejs/node/pull/24523)
61+
* [[`f20ac47d7a`](https://github.com/nodejs/node/commit/f20ac47d7a)] - **deps**: update archs files for OpenSSL-1.1.0 (Sam Roberts) [#24523](https://github.com/nodejs/node/pull/24523)
62+
* [[`8248d227b7`](https://github.com/nodejs/node/commit/8248d227b7)] - **deps**: add s390 asm rules for OpenSSL-1.1.0 (Shigeki Ohtsu) [#24523](https://github.com/nodejs/node/pull/24523)
63+
* [[`65d03f0180`](https://github.com/nodejs/node/commit/65d03f0180)] - **deps**: upgrade openssl sources to 1.1.0j (Sam Roberts) [#24523](https://github.com/nodejs/node/pull/24523)
64+
* [[`a2b8aba23c`](https://github.com/nodejs/node/commit/a2b8aba23c)] - **deps,http**: llhttp set max header size to 8KB (Rod Vagg) [nodejs-private/node-private#149](https://github.com/nodejs-private/node-private/pull/149)
65+
* [[`74e01d0020`](https://github.com/nodejs/node/commit/74e01d0020)] - **deps,http**: http\_parser set max header size to 8KB (Matteo Collina) [nodejs-private/node-private#143](https://github.com/nodejs-private/node-private/pull/143)
66+
* [[`4ecbd3bdaa`](https://github.com/nodejs/node/commit/4ecbd3bdaa)] - **http**: reset headers\_nread\_ on llhttp parser reuse (Rod Vagg) [nodejs-private/node-private#149](https://github.com/nodejs-private/node-private/pull/149)
67+
* [[`04e0620597`](https://github.com/nodejs/node/commit/04e0620597)] - **http**: fix header limit errors and test for llhttp (Fedor Indutny) [nodejs-private/node-private#149](https://github.com/nodejs-private/node-private/pull/149)
68+
* [[`315ee2e626`](https://github.com/nodejs/node/commit/315ee2e626)] - **(SEMVER-MINOR)** **http,https**: protect against slow headers attack (Matteo Collina) [nodejs-private/node-private#144](https://github.com/nodejs-private/node-private/pull/144)
69+
* [[`d7504324e1`](https://github.com/nodejs/node/commit/d7504324e1)] - **url**: avoid hostname spoofing w/ javascript protocol (Matteo Collina) [nodejs-private/node-private#145](https://github.com/nodejs-private/node-private/pull/145)
70+
3271
<a id="11.2.0"></a>
3372
## 2018-11-15, Version 11.2.0 (Current), @BridgeAR
3473

doc/changelogs/CHANGELOG_V6.md

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
</tr>
1111
<tr>
1212
<td valign="top">
13+
<a href="#6.15.0">6.15.0</a><br/>
1314
<a href="#6.14.4">6.14.4</a><br/>
1415
<a href="#6.14.3">6.14.3</a><br/>
1516
<a href="#6.14.2">6.14.2</a><br/>
@@ -73,6 +74,51 @@
7374
[Node.js Long Term Support Plan](https://github.com/nodejs/LTS) and
7475
will be supported actively until April 2018 and maintained until April 2019.
7576

77+
<a id="6.15.0"></a>
78+
## 2018-11-27, Version 6.15.0 'Boron' (LTS), @rvagg
79+
80+
This is a security release. All Node.js users should consult the security release summary at:
81+
82+
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
83+
84+
for details on patched vulnerabilities.
85+
86+
Fixes for the following CVEs are included in this release:
87+
88+
* Node.js: Debugger port 5858 listens on any interface by default (CVE-2018-12120)
89+
* Node.js: Denial of Service with large HTTP headers (CVE-2018-12121)
90+
* Node.js: Slowloris HTTP Denial of Service (CVE-2018-12122 / Node.js)
91+
* Node.js: Hostname spoofing in URL parser for javascript protocol (CVE-2018-12123)
92+
* Node.js: HTTP request splitting (CVE-2018-12116)
93+
* OpenSSL: Timing vulnerability in DSA signature generation (CVE-2018-0734)
94+
* OpenSSL: Microarchitecture timing vulnerability in ECC scalar multiplication (CVE-2018-5407)
95+
96+
### Notable Changes
97+
98+
* **debugger**: Backport of [nodejs/node#8106](https://github.com/nodejs/node/pull/8106) to prevent the debugger from listening on `0.0.0.0`. It now defaults to `127.0.0.1`. Reported by Ben Noordhuis. (CVE-2018-12120 / Ben Noordhuis).
99+
* **deps**: Upgrade to OpenSSL 1.0.2q, fixing CVE-2018-0734 and CVE-2018-5407
100+
* **http**:
101+
* Headers received by HTTP servers must not exceed 8192 bytes in total to prevent possible Denial of Service attacks. Reported by Trevor Norris. (CVE-2018-12121 / Matteo Collina)
102+
* A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with `server.headersTimeout`. Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with `server.setTimeout()`, this aids in protecting against excessive resource retention and possible Denial of Service. Reported by Jan Maybach ([liebdich.com](https://liebdich.com)). (CVE-2018-12122 / Matteo Collina)
103+
* Two-byte characters are now strictly disallowed for the `path` option in HTTP client requests. Paths containing characters outside of the range `\u0021` - `\u00ff` will now be rejected with a `TypeError`. This behavior can be reverted if necessary by supplying the `--security-revert=CVE-2018-12116` command line argument (this is not recommended). Reported as security concern for Node.js 6 and 8 by [Arkadiy Tetelman](https://twitter.com/arkadiyt) ([Lob](https://lob.com)), fixed by backporting a change by Benno Fünfstück applied to Node.js 10 and later. (CVE-2018-12116 / Matteo Collina)
104+
* **url**: Fix a bug that would allow a hostname being spoofed when parsing URLs with `url.parse()` with the `'javascript:'` protocol. Reported by [Martin Bajanik](https://twitter.com/_bayotop) ([Kentico](https://kenticocloud.com/)). (CVE-2018-12123 / Matteo Collina)
105+
106+
### Commits
107+
108+
* [[`4beba664e1`](https://github.com/nodejs/node/commit/4beba664e1)] - **deps**: add -no\_rand\_screen to openssl s\_client (Shigeki Ohtsu) [nodejs/node#1836](https://github.com/nodejs/node/pull/1836)
109+
* [[`049fe7978f`](https://github.com/nodejs/node/commit/049fe7978f)] - **deps**: fix asm build error of openssl in x86\_win32 (Shigeki Ohtsu) [nodejs/node#1389](https://github.com/nodejs/node/pull/1389)
110+
* [[`e9becec84d`](https://github.com/nodejs/node/commit/e9becec84d)] - **deps**: fix openssl assembly error on ia32 win32 (Fedor Indutny) [nodejs/node#1389](https://github.com/nodejs/node/pull/1389)
111+
* [[`78b3a5b2f7`](https://github.com/nodejs/node/commit/78b3a5b2f7)] - **deps**: copy all openssl header files to include dir (Sam Roberts) [#24530](https://github.com/nodejs/node/pull/24530)
112+
* [[`6120f2429e`](https://github.com/nodejs/node/commit/6120f2429e)] - **deps**: upgrade openssl sources to 1.0.2q (Sam Roberts) [#24530](https://github.com/nodejs/node/pull/24530)
113+
* [[`92231a56d9`](https://github.com/nodejs/node/commit/92231a56d9)] - **deps,http**: http\_parser set max header size to 8KB (Matteo Collina) [nodejs-private/node-private#143](https://github.com/nodejs-private/node-private/pull/143)
114+
* [[`dd20c0186f`](https://github.com/nodejs/node/commit/dd20c0186f)] - **(SEMVER-MINOR)** **http**: add --security-revert for CVE-2018-12116 (Matteo Collina) [nodejs-private/node-private#146](https://github.com/nodejs-private/node-private/pull/146)
115+
* [[`811b63c794`](https://github.com/nodejs/node/commit/811b63c794)] - **(SEMVER-MINOR)** **http**: disallow two-byte characters in URL path (Benno Fünfstück) [nodejs-private/node-private#146](https://github.com/nodejs-private/node-private/pull/146)
116+
* [[`618eebdd17`](https://github.com/nodejs/node/commit/618eebdd17)] - **(SEMVER-MINOR)** **http,https**: protect against slow headers attack (Matteo Collina) [nodejs-private/node-private#152](https://github.com/nodejs-private/node-private/pull/152)
117+
* [[`b78d403da3`](https://github.com/nodejs/node/commit/b78d403da3)] - **openssl**: fix keypress requirement in apps on win32 (Shigeki Ohtsu) [nodejs/node#1389](https://github.com/nodejs/node/pull/1389)
118+
* [[`35344e87bf`](https://github.com/nodejs/node/commit/35344e87bf)] - **src**: minor cleanup for node\_revert (James M Snell) [#14864](https://github.com/nodejs/node/pull/14864)
119+
* [[`a9791c9090`](https://github.com/nodejs/node/commit/a9791c9090)] - **src**: make debugger listen on 127.0.0.1 by default (Ben Noordhuis) [nodejs-private/node-private#148](https://github.com/nodejs-private/node-private/pull/148)
120+
* [[`9c268d0492`](https://github.com/nodejs/node/commit/9c268d0492)] - **url**: avoid hostname spoofing w/ javascript protocol (Matteo Collina) [nodejs-private/node-private#145](https://github.com/nodejs-private/node-private/pull/145)
121+
76122
<a id="6.14.4"></a>
77123
## 2018-08-15, Version 6.14.4 'Boron' (LTS), @rvagg
78124

0 commit comments

Comments
 (0)