siroc
siroc copied to clipboard
chore(deps): update node.js to v12.22.12
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
node (source) | volta | patch | 12.22.1 -> 12.22.12 |
Release Notes
nodejs/node (node)
v12.22.12
: 2022-04-05, Version 12.22.12 'Erbium' (LTS), @richardlau
Notable Changes
This is planned to be the final Node.js 12 release. Node.js 12 will reach End-of-Life status on 30 April 2022, after which it will no receive updates. You are strongly advised to migrate your applications to Node.js 16 or 14 (both of which are Long Term Support (LTS) releases) to continue to receive future security updates beyond 30 April 2022.
This release fixes a shutdown crash in Node-API (formerly N-API) and a
potential stack overflow when using vm.runInNewContext()
.
The list of GPG keys used to sign releases and instructions on how to fetch the keys for verifying binaries has been synchronized with the main branch.
Commits
- [
1193290f3f
] - deps: V8: cherry-pickcc9a8a3
(devsnek) #42065 - [
333eda8d03
] - doc: add a note about possible missing lines to readline.asyncIterator (Igor Mikhalev) #34675 - [
518a49c0c6
] - doc: use openpgp.org for keyserver examples (Nick Schonning) #39227 - [
11aef2ad03
] - doc: update release key for Danielle Adams (Danielle Adams) #36793 - [
a9c38f1003
] - doc: add release key for Danielle Adams (Danielle Adams) #35545 - [
a35f553889
] - doc: add release key for Bryan English (Bryan English) #42102 - [
5f104e3218
] - node-api: cctest on v8impl::Reference (legendecas) #38970 - [
e23c04f0dc
] - node-api: avoid SecondPassCallback crash (Michael Dawson) #38899 - [
a7224c9559
] - node-api: fix shutdown crashes (Michael Dawson) #38492 - [
81b4dc88f1
] - node-api: make reference weak parameter an indirect link to references (Chengzhong Wu) #38000 - [
2aa9ca1ea9
] - node-api: fix crash in finalization (Michael Dawson) #37876 - [
a2f4206415
] - node-api: stop ref gc during environment teardown (Gabriel Schulhof) #37616 - [
171bb66ccc
] - node-api: force env shutdown deferring behavior (Gabriel Schulhof) #37303 - [
e707514c80
] - src: fix finalization crash (James M Snell) #38250
v12.22.11
: 2022-03-17, Version 12.22.11 'Erbium' (LTS), @richardlau
This is a security release.
Notable changes
Update to OpenSSL 1.1.1n, which addresses the following vulnerability:
- Infinite loop in
BN_mod_sqrt()
reachable when parsing certificates (High)(CVE-2022-0778) More details are available at https://www.openssl.org/news/secadv/20220315.txt
Fix for building Node.js 12.x with Visual Studio 2019 to allow us to continue to run CI tests.
Commits
- [
e3e5bf11ba
] - build: pin Windows GitHub runner to windows-2019 (Richard Lau) #42349 - [
f41e7771bf
] - build: fix detection of Visual Studio 2019 (Richard Lau) #42349 - [
c372ec207d
] - deps: update archs files for OpenSSL-1.1.n (Richard Lau) #42348 - [
d574a1dccb
] - deps: upgrade openssl sources to 1.1.1n (Richard Lau) #42348
v12.22.10
: 2022-02-01, Version 12.22.10 'Erbium' (LTS), @ruyadorno
Notable changes
- Upgrade npm to 6.14.16
- Updated ICU time zone data
Commits
- [
33899b435d
] - deps: upgrade npm to 6.14.16 (Ruy Adorno) #41601 - [
d9237c46ca
] - tools: update tzdata to 2021a4 (Albert Wang) #41443
v12.22.9
: 2022-01-10, Version 12.22.9 'Erbium' (LTS), @richardlau
This is a security release.
Notable changes
Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)
Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.
Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert
command-line option.
More details will be available at CVE-2021-44531 after publication.
Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)
Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.
Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert
command-line option.
More details will be available at CVE-2021-44532 after publication.
Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)
Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.
Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
More details will be available at CVE-2021-44533 after publication.
Prototype pollution via console.table
properties (Low)(CVE-2022-21824)
Due to the formatting logic of the console.table()
function it was not safe to allow user controlled input to be passed to the properties
parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be __proto__
. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.
Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to.
More details will be available at CVE-2022-21824 after publication.
Thanks to Patrik Oldsberg (rugvip) for reporting this vulnerability.
Commits
- [
be69403528
] - console: fix prototype pollution via console.table (Tobias Nießen) nodejs-private/node-private#307 - [
19873abfb2
] - crypto,tls: implement safe x509 GeneralName format (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300 - [
ff9ac7d757
] - doc: fix date for v12.22.8 (Richard Lau) #41213 - [
a5c7843cab
] - src: add cve reverts and associated tests (Michael Dawson and Akshay Kumar) nodejs-private/node-private#300 - [
d4e5d1b9ca
] - src: remove unused x509 functions (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300 - [
8c2db2c86b
] - tls: fix handling of x509 subject and issuer (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300 - [
e0fe6a635e
] - tls: drop support for URI alternative names (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300
v12.22.8
: 2021-12-16, Version 12.22.8 'Erbium' (LTS), @richardlau
Notable Changes
This release contains a c-ares update to fix a regression introduced in Node.js 12.22.5 resolving CNAME records containing underscores #39780.
Root certificates have been updated to those from Mozilla's Network Security Services 3.71 #40281.
Commits
- [
2d42295d2a
] - build: pin macOS GitHub runner to macos-10.15 (Richard Lau) #41124 - [
41e09ec71b
] - child_process: retain reference to data with advanced serialization (Anna Henningsen) #38728 - [
f0be07796e
] - crypto: update root certificates (Richard Lau) #40280 - [
4c9f920d34
] - deps: update archs files for OpenSSL-1.1.1m (Richard Lau) #41172 - [
60d7d4171e
] - deps: upgrade openssl sources to 1.1.1m (Richard Lau) #41172 - [
7feff67419
] - deps: add -fno-strict-aliasing flag to libuv (Daniel Bevenius) #40631 - [
534ac7c7c6
] - deps: update c-ares to 1.18.1 (Richard Lau) #40660 - [
c019fa9b70
] - deps: update to [email protected] (Guy Bedford) #39402 - [
b13340eff4
] - doc: add alternative version links to the packages page (Filip Skokan) #36915 - [
243b2fbfdb
] - lib: fix regular expression to detect `/` and `\` (Francesco Trotta) #40325 - [
70e094a26b
] - repl: fix error message printing (Anna Henningsen) #38209 - [
02b432a704
] - src: fix crash in AfterGetAddrInfo (Anna Henningsen) #39735 - [
7479447d6a
] - test: deflake child-process-pipe-dataflow (Luigi Pinca) #40838 - [
833e199393
] - tools: update certdata.txt (Richard Lau) #40280 - [
e4339fe286
] - tools: add script to update c-ares (Richard Lau) #40660 - [
f50b9c1e8a
] - worker: avoid potential deadlock on NearHeapLimit (Santiago Gimeno) #38403
v12.22.7
: 2021-10-12, Version 12.22.7 'Erbium' (LTS), @danielleadams
This is a security release.
Notable changes
-
CVE-2021-22959: HTTP Request Smuggling due to spaced in headers (Medium)
- The http parser accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS). More details will be available at CVE-2021-22959 after publication.
-
CVE-2021-22960: HTTP Request Smuggling when parsing the body (Medium)
- The parse ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions. More details will be available at CVE-2021-22960 after publication.
Commits
- [
21a2e554e3
] - deps: update llhttp to 2.1.4 (Fedor Indutny) nodejs-private/node-private#286 - [
d5d3a03246
] - http: add regression test for smuggling content length (Matteo Collina) nodejs-private/node-private#286 - [
0858587f21
] - http: add regression test for chunked smuggling (Matteo Collina) nodejs-private/node-private#286
v12.22.6
: 2021-08-31, Version 12.22.6 'Erbium' (LTS), @MylesBorins
This is a security release.
Notable Changes
These are vulnerabilities in the node-tar, arborist, and npm cli modules which are related to the initial reports and subsequent remediation of node-tar vulnerabilities CVE-2021-32803 and CVE-2021-32804. Subsequent internal security review of node-tar and additional external bounty reports have resulted in another 5 CVE being remediated in core npm CLI dependencies including node-tar, and npm arborist.
You can read more about it in:
Commits
- [
a0154b586b
] - deps: update archs files for OpenSSL-1.1.1l (Richard Lau) #39869 - [
7a95637eb7
] - deps: upgrade openssl sources to 1.1.1l (Richard Lau) #39869 - [
840b0ffff6
] - deps: upgrade npm to 6.14.15 (Darcy Clarke) #39856
v12.22.5
: 2021-08-11, Version 12.22.5 'Erbium' (LTS), @BethGriggs
This is a security release.
Notable Changes
-
CVE-2021-3672/CVE-2021-22931: Improper handling of untypical characters in domain names (High)
- Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library which can lead to the output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library. You can read more about it at https://nvd.nist.gov/vuln/detail/CVE-2021-22931.
-
CVE-2021-22940: Use after free on close http2 on stream canceling (High)
- Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. This release includes a follow-up fix for CVE-2021-22930 as the issue was not completely resolved by the previous fix. You can read more about it at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940.
-
CVE-2021-22939: Incomplete validation of rejectUnauthorized parameter (Low)
- If the Node.js HTTPS API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted. You can read more about it at https://nvd.nist.gov/vuln/detail/CVE-2021-22939.
Commits
- [
5f947db68c
] - deps: update c-ares to 1.17.2 (Beth Griggs) #39724 - [
42695ea34b
] - deps: reflect c-ares source tree (Beth Griggs) #39653 - [
e4c9156b32
] - deps: apply missed updates from c-ares 1.17.1 (Beth Griggs) #39653 - [
9cd1f53103
] - http2: add tests for cancel event while client is paused reading (Akshay K) #39622 - [
2008c9722f
] - http2: update handling of rst_stream with error code NGHTTP2_CANCEL (Akshay K) #39622 - [
1780bbc329
] - tls: validate "rejectUnauthorized: undefined" (Matteo Collina) nodejs-private/node-private#276
v12.22.4
: 2021-07-29, Version 12.22.4 'Erbium' (LTS), @richardlau
This is a security release.
Notable Changes
-
CVE-2021-22930: Use after free on close http2 on stream canceling (High)
- Node.js is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930
Commits
- [
499e56babe
] - build: fix label-pr workflow (Michaël Zasso) #38399 - [
98ac3c4108
] - build: label PRs with GitHub Action instead of nodejs-github-bot (Phillip Johnsen) #38301 - [
ddc8dde150
] - deps: upgrade npm to 6.14.14 (Darcy Clarke) #39553 - [
e11a862eed
] - deps: update to c-ares 1.17.1 (Danny Sonnenschein) #36207 - [
39e9cd540f
] - deps: restore minimum ICU version to 65 (Richard Lau) #39068 - [
e459c79b02
] - deps: V8: cherry-pick035c305
(Michaël Zasso) #38497 - [
b3c698a5d8
] - deps: update to [email protected] (Guy Bedford) #38450 - [
7d5a2f9588
] - deps: update to [email protected] (Guy Bedford) #37992 - [
906b43e586
] - deps: V8: update build dependencies (Michaël Zasso) #39245 - [
15b91fa3fa
] - deps: V8: backport8959494
(Michaël Zasso) #39245 - [
8046daf09f
] - deps: V8: cherry-pick0b3a4ec
(Michaël Zasso) #39245 - [
f4377b13a6
] - deps: V8: cherry-pick7c182bd
(Michaël Zasso) #39245 - [
add7b5b4c2
] - deps: V8: cherry-pickcc641f6
(Michaël Zasso) #39245 - [
a73275f056
] - deps: V8: cherry-pick7b33328
(Michaël Zasso) #39245 - [
492b0d6b37
] - deps: V8: cherry-picke6f62a4
(Michaël Zasso) #39245 - [
2b54156260
] - deps: V8: cherry-pick92e6d33
(Michaël Zasso) #39245 - [
bbceab4d91
] - deps: V8: backport1b1eda0
(Michaël Zasso) #39245 - [
93a1a3c5ae
] - deps: V8: cherry-pick530080c
(Milad Fa) #38509 - [
b263f2585a
] - http2: on receiving rst_stream with cancel code add it to pending list (Akshay K) #39423 - [
3e4bc1b0d3
] - module: fix legacynode
specifier resolution to resolve"main"
field (Antoine du Hamel) #38979 - [
f552c45676
] - src: move CHECK in AddIsolateFinishedCallback (Fedor Indutny) #38010 - [
30ce0e66ae
] - src: update cares_wrap OpenBSD defines (Anna Henningsen) #38670
v12.22.3
: 2021-07-05, Version 12.22.3 'Erbium' (LTS), @richardlau
Notable Changes
Node.js 12.22.2 introduced a regression in the Windows installer on non-English locales that is being fixed in this release. There is no need to download this release if you are not using the Windows installer.
Commits
- [
182f86a4d4
] - win,msi: use localized "Authenticated Users" name (Richard Lau) #39241
v12.22.2
: 2021-07-01, Version 12.22.2 'Erbium' (LTS), @richardlau
This is a security release.
Notable Changes
Vulnerabilities fixed:
-
CVE-2021-22918: libuv upgrade - Out of bounds read (Medium)
- Node.js is vulnerable to out-of-bounds read in libuv's uv__idna_toascii() function which is used to convert strings to ASCII. This is called by Node's dns module's lookup() function and can lead to information disclosures or crashes. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918
-
CVE-2021-22921: Windows installer - Node Installer Local Privilege Escalation (Medium)
- Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22921
-
CVE-2021-27290: npm upgrade - ssri Regular Expression Denial of Service (ReDoS) (High)
- This is a vulnerability in the ssri npm mudule which may be vulnerable to denial of service attacks. You can read more about it in https://github.com/advisories/GHSA-vx3p-948g-6vhq
-
CVE-2021-23362: npm upgrade - hosted-git-info Regular Expression Denial of Service (ReDoS) (Medium)
- This is a vulnerability in the hosted-git-info npm mudule which may be vulnerable to denial of service attacks. You can read more about it in https://nvd.nist.gov/vuln/detail/CVE-2021-23362
Commits
- [
623fd1fcb5
] - deps: uv: cherry-pick99c29c9
(Ben Noordhuis) nodejs-private/node-private#267 - [
923b3760f8
] - deps: upgrade npm to 6.14.13 (Ruy Adorno) #38214 - [
a52790cba0
] - win,msi: set install directory permission (AkshayK) nodejs-private/node-private#269
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, check this box
This PR has been generated by Mend Renovate. View repository job log here.