react-video-player-extended
react-video-player-extended copied to clipboard
chore(deps): bump node-forge and webpack-dev-server
Bumps node-forge to 1.3.1 and updates ancestor dependency webpack-dev-server. These dependencies need to be updated together.
Updates node-forge
from 0.10.0 to 1.3.1
Changelog
Sourced from node-forge's changelog.
1.3.1 - 2022-03-29
Fixes
- RFC 3447 and RFC 8017 allow for optional
DigestAlgorithm
NULL
parameters forsha*
algorithms and requireNULL
paramters formd2
andmd5
algorithms.1.3.0 - 2022-03-17
Security
- Three RSA PKCS#1 v1.5 signature verification issues were reported by Moosa Yahyazadeh ([email protected]).
- HIGH: Leniency in checking
digestAlgorithm
structure can lead to signature forgery.
- The code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. For more information, please see "Bleichenbacher's RSA signature forgery based on implementation error" by Hal Finney.
- CVE ID: CVE-2022-24771
- GHSA ID: GHSA-cfm4-qjh2-4765
- HIGH: Failing to check tailing garbage bytes can lead to signature forgery.
- The code does not check for tailing garbage bytes after decoding a
DigestInfo
ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. For more information, please see "Bleichenbacher's RSA signature forgery based on implementation error" by Hal Finney.- CVE ID: CVE-2022-24772
- GHSA ID: GHSA-x4jg-mjrx-434g
- MEDIUM: Leniency in checking type octet.
DigestInfo
is not properly checked for proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest.- CVE ID: CVE-2022-24773
- GHSA ID: GHSA-2r2c-g63r-vccr
Fixed
- [asn1] Add fallback to pretty print invalid UTF8 data.
- [asn1]
fromDer
is now more strict and will default to ensuring all input bytes are parsed or throw an error. A new optionparseAllBytes
can disable this behavior.
- NOTE: The previous behavior is being changed since it can lead to security issues with crafted inputs. It is possible that code doing custom DER parsing may need to adapt to this new behavior and optional flag.
- [rsa] Add and use a validator to check for proper structure of parsed ASN.1
... (truncated)
Commits
a0a4a42
Release 1.3.1.a33830f
Update changelog.740954d
Allow optional DigestAlgorithm parameters.56f4316
Allow DigestInfo.DigestAlgorith.parameters to be optionalcbf0bd5
Start 1.3.1-0.6c5b901
Release 1.3.0.0f3972a
Update changelog.dc77b39
Fix error checking.bb822c0
Add advisory links.d4395fe
Update changelog.- Additional commits viewable in compare view
Updates webpack-dev-server
from 3.8.2 to 4.15.1
Release notes
Sourced from webpack-dev-server's releases.
v4.15.1
4.15.1 (2023-06-09)
Bug Fixes
- replace
::
withlocalhost
before openBrowser() (#4856) (874c44b)- types: compatibility with
@types/ws
(#4899) (34bcec2)v4.15.0
4.15.0 (2023-05-07)
Features
v4.14.0
4.14.0 (2023-05-06)
Features
- allow CLI to be ESM (#4837) (bb4a5d9)
- allow filter overlay errors/warnings/runtimeErrors with function (#4813) (aab01b3)
v4.13.3
4.13.3 (2023-04-15)
Bug Fixes
v4.13.2
4.13.2 (2023-03-31)
Bug Fixes
- prevent open 0.0.0.0 in browser due windows problems (04e74f2)
v4.13.1
4.13.1 (2023-03-18)
Bug Fixes
... (truncated)
Changelog
Sourced from webpack-dev-server's changelog.
4.15.1 (2023-06-09)
Bug Fixes
- replace
::
withlocalhost
before openBrowser() (#4856) (874c44b)- types: compatibility with
@types/ws
(#4899) (34bcec2)4.15.0 (2023-05-07)
Features
4.14.0 (2023-05-06)
Features
- allow CLI to be ESM (#4837) (bb4a5d9)
- allow filter overlay errors/warnings with function (#4813) (aab01b3)
4.13.3 (2023-04-15)
Bug Fixes
4.13.2 (2023-03-31)
Bug Fixes
- prevent open 0.0.0.0 in browser due windows problems (04e74f2)
4.13.1 (2023-03-18)
Bug Fixes
4.13.0 (2023-03-17)
Features
... (truncated)
Commits
540c438
chore(release): 4.15.134bcec2
fix(types): compatibility with@types/ws
(#4899)3d61107
chore(deps-dev): bump eslint from 8.40.0 to 8.41.0 (#4867)ddc87c8
chore(deps-dev): bump@types/node
from 18.16.9 to 18.16.14 (#4868)168cf65
chore(deps-dev): bump@types/node
from 18.16.7 to 18.16.9 (#4862)874c44b
fix: replace::
withlocalhost
before openBrowser() (#4856)c54e427
chore(deps-dev): bump@types/node
from 18.16.3 to 18.16.7 (#4857)b2c8017
chore(deps-dev): bump webpack from 5.82.0 to 5.82.1 (#4858)4e35921
chore(deps-dev): bump eslint from 8.39.0 to 8.40.0 (#4851)99f66cb
chore(release): 4.15.0- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.