- doc: add Windows-specific info to subprocess.kill() (João Lucas Lucchetta) #34867.- doc: add missing cleanup step in OpenSSL upgrade (Tobias Nießen) #37927.
- doc: document how to unref stdin when using readline.Interface (Anu Pasumarthy) #38019.- doc: fix n() description (Darkripper214) #38023.- deps: cjs-module-lexer: cherry-pick 22093e765f (pezhmanparsaee) #37895.- deps: upgrade openssl sources to 1.1.1k+quic (Hassaan Pasha) #37916.- deps: update archs files for OpenSSL-1.1.1k (Hassaan Pasha) #37916.- deps: update to (Guy Bedford) #37992.- crypto: add buffering to randomInt (Tobias Nießen) #35110.- crypto: use correct webcrypto RSASSA-PKCS1-v1_5 algorithm name (Filip Skokan) #38029.- (SEMVER-MINOR) readline: add AbortSignal support to interface (Nitzan Uziely) #37932.- (SEMVER-MINOR) net,tls: add abort signal support to connect (Nitzan Uziely) #37735.- (SEMVER-MINOR) net: make net.BlockList cloneable (James M Snell) #37917.- (SEMVER-MINOR) net: add SocketAddress class (James M Snell) #37917.- (SEMVER-MINOR) net: allow net.BlockList to use net.SocketAddress objects (James M Snell) #37917.- (SEMVER-MINOR) fs: add support for async iterators to fsPromises.writeFile (HiroyukiYagihashi) #37490.All versions of the 14.x, 12.x and 10.x releases lines.This is a vulnerability in the y18n npm module which may be exploited by prototype pollution.CVE-2020-7774: npm upgrade - Update y18n to fix Prototype-Pollution (High).CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (High).All versions of the 15.x, 14.x, 12.x and 10.x releases lines.This is a vulnerability in OpenSSL which may be exploited through Node.js.CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High).Node v15.14.0 (Current) By Myles Borins, Notable Changes