Mirillis Action! 歷史版本列表
Mirillis Action! 允許在一流的高清視頻質量的 Windows 桌面流媒體和實時錄製。隨著行動!您可以錄製和流式傳輸您的遊戲玩法,網絡播放器視頻,錄製音樂,截取屏幕截圖,遠程訪問您的 PC,使用 Android 設備玩 PC 遊戲等等。下載 Mirillis Action! 用於 Windows 的脫機安裝程序安裝.以 HD 格式記錄遊戲。基準遊戲性能.行動!出色的性能和 GPU 利... Mirillis Action! 軟體介紹更新時間:2021-03-18
更新細節:
What's new in this version:
crypto:
- add optional callback to crypto.sign and crypto.verify
- support JWK objects in create*Key
deps:
- switch openssl to quictls/openssl
- update to [email protected]
fs:
- improve fsPromises writeFile performance
- improve fsPromises readFile performance
lib:
- implement AbortSignal.abort()
node-api:
- define version 8
worker:
- add setEnvironmentData/getEnvironmentData
更新時間:2021-03-12
更新細節:
更新時間:2021-03-11
更新細節:
更新時間:2021-03-11
更新細節:
更新時間:2021-03-10
更新細節:
更新時間:2021-03-04
更新細節:
更新時間:2021-03-04
更新細節:
更新時間:2021-03-03
更新細節:
What's new in this version:
- crypto: make FIPS related options always awailable
- errors: remove experimental from --enable-source-maps
更新時間:2021-02-24
更新細節:
What's new in this version:
Fixed:
- CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion
Affected Node.js versions are vulnerable to denial of service attacks when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
- CVE-2021-22884: DNS rebinding in --inspect
Affected Node.js versions are vulnerable to denial of service attacks when the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
- CVE-2021-23840: OpenSSL - Integer overflow in CipherUpdate
This is a vulnerability in OpenSSL which may be exploited through Node.js
更新時間:2021-02-18
更新細節:
What's new in this version:
Changed:
crypto:
- add keyObject.export() 'jwk' format option
deps:
- upgrade to libuv 1.41.0
doc:
- add dmabupt to collaborators
- refactor fs docs structure
fs:
- add fsPromises.watch()
- use a default callback for fs.close()
- add AbortSignal support to watch
perf_hooks:
- introduce createHistogram
stream:
- improve Readable.from error handling
timers:
- introduce setInterval async iterator
tls:
- add ability to get cert/peer cert as X509Certificate object