chore(deps): update node.js to v14.20.0
This PR contains the following updates:
| Package | Update | Change |
|---|---|---|
| node | minor | 14.18.2 -> 14.20.0 |
Release Notes
nodejs/node
v14.20.0
This is a security release.
Notable Changes
- [
8e8aef836c] - (SEMVER-MAJOR) src,deps,build,test: add OpenSSL config appname (Daniel Bevenius) #43124 - [
98965b137d] - deps: upgrade openssl sources to 1.1.1q (RafaelGSS) #43686
Commits
- [
b93e048bf6] - deps: update archs files for OpenSSL-1.1.1q (RafaelGSS) #43686 - [
98965b137d] - deps: upgrade openssl sources to 1.1.1q (RafaelGSS) #43686 - [
837a1d803e] - deps: update archs files for OpenSSL-1.1.1p (RafaelGSS) #43527 - [
c5d9c9a49e] - deps: upgrade openssl sources to 1.1.1p (RafaelGSS) #43527 - [
da0fda0fe8] - http: stricter Transfer-Encoding and header separator parsing (Paolo Insogna) #315 - [
48c5aa5cab] - src: fix IPv4 validation in inspector_socket (Tobias Nießen) nodejs-private/node-private#320 - [
8e8aef836c] - (SEMVER-MAJOR) src,deps,build,test: add OpenSSL config appname (Daniel Bevenius) #43124
v14.19.3
Notable Changes
- This release updates OpenSSL to 1.1.1o. This update is not being treated as a security release as the issues addressed in OpenSSL 1.1.1o were assessed to not affect Node.js 14. See https://nodejs.org/en/blog/vulnerability/openssl-fixes-in-regular-releases-may2022/ for more information on how the May 2022 OpenSSL releases affects other Node.js release lines.
- The list of GPG keys used to sign releases has been synchronized with the main branch.
Commits
- [
68397e49d9] - deps: update archs files for OpenSSL-1.1.1o (RafaelGSS) #42956 - [
7f9a5ed4a8] - deps: upgrade openssl sources to 1.1.1o (RafaelGSS) #42956 - [
61eba58cb6] - doc: add release key for Juan Arboleda (Juan José) #42961
v14.19.2
Notable Changes
doc:
- New release key for Bryan English
Learn more at: #42102 Contributed by Bryan English (@bengl)
npm:
- Upgrade
npmtov6.14.17.
Learn more at: #42900 Contributed by Ruy Adorno (@ruyadorno)
V8:
- V8 had a stack overflow issue affecting the
vmmodule, cherry-pickingcc9a8a37445efrom V8 solves this issue.
Learn more at: #41826 Contributed by Gus Caplan (@devsnek)
- Using
getHeapSnapshot()was causing a Node.js crash due a V8 issue, this is fixed by backporting367b0c1e7a32from V8.
Learn more at: #42637 Contributed by Chengzhong Wu (@legendecas)
Commits
- [
c73ac527d6] - build: set DESTCPU correctly for 'make binary' on Apple Silicon (Chris Heisterkamp) #40147 - [
dcaed6db24] - build: use ccache in make-v8.sh on ppc64le and s390x (Richard Lau) #42204 - [
4203d132b1] - child_process: queue pending messages (Erick Wendel) #41221 - [
a3ebdbfe8f] - deps: upgrade npm to 6.14.17 (Ruy Adorno) #42900 - [
39e44f8382] - deps: V8: cherry-pickcc9a8a3(Gus Caplan) #41826 - [
b52a268b6f] - deps: V8: cherry-pick367b0c1(legendecas) #42637 - [
77ba012065] - doc: fix documentation ofFileHandle.prototype.appendFile(Antoine du Hamel) #42588 - [
3d3d7ed1b7] - doc: specify flag needed for JSON and Wasm modules (Rich Trott) #42736 - [
542d812c93] - doc: use openpgp.org for keyserver examples (Nick Schonning) #39227 - [
7f2825b1a9] - doc: add release key for Bryan English (Bryan English) #42102 - [
75302d3dce] - fs: fix write methods param validation and docs (Livia Medeiros) #41677 - [
d4171e0eac] - stream: resume stream on drain (Robert Nagy) #41848 - [
de474c8b6f] - worker: do not send message if port is closing (Rich Trott) #42357
v14.19.1
This is a security release.
Notable Changes
Update to OpenSSL 1.1.1n, which addresses the following vulnerability:
- Infinite loop in
BN_mod_sqrt()reachable when parsing certificates (High)(CVE-2022-0778) More details are available at https://www.openssl.org/news/secadv/20220315.txt
Commits
- [
b5c52e337e] - build: pin Windows GitHub runner to windows-2019 (Richard Lau) #42350 - [
3b1a0b24f0] - deps: update archs files for OpenSSL-1.1.1n (Richard Lau) #42347 - [
c83dd99e0b] - deps: upgrade openssl sources to 1.1.1n (Richard Lau) #42347
v14.19.0
Notable Changes
Corepack
Node.js now includes Corepack, a script that acts as a bridge between Node.js projects and the package managers they are intended to be used with during development. In practical terms, Corepack will let you use Yarn and pnpm without having to install them - just like what currently happens with npm, which is shipped in Node.js by default. Please head over to the Corepack documentation page for more information on how to use it.
Contributed by Maël Nison - #39608
ICU updated
ICU has been updated to 70.1. This updates timezone database to 2021a3, including bringing forward the start for DST for Jordan from March to February.
Contributed by Michaël Zasso - #40658
New option to disable loading of native addons
A new command line option --no-addons has been added to disallow loading of native addons.
Contributed by Dominic Elm - #39977
Updated Root Certificates
Root certificates have been updated to those from Mozilla's Network Security Services 3.71.
Contributed by Richard Lau - #40280
Other Notable Changes
- [
0d448eaab5] - (SEMVER-MINOR) crypto: make FIPS related options always available (Vít Ondruch) #36341 - [
004eafbebf] - (SEMVER-MINOR) lib: add unsubscribe method to non-active DC channels (simon-id) #40433 - [
625be7585d] - (SEMVER-MINOR) lib: add return value for DC channel.unsubscribe (simon-id) #40433 - [
607bc74eae] - (SEMVER-MINOR) module: support pattern trailers (Guy Bedford) #39635 - [
f74fe2a59c] - (SEMVER-MINOR) src: make napi_create_reference accept symbol (JckXia) #39926
Commits
- [
0231ffa501] - build: add--without-corepack(Jonah Snider) #41060 - [
5389b8ab05] - crypto: update root certificates (Richard Lau) #40280 - [
0d448eaab5] - (SEMVER-MINOR) crypto: make FIPS related options always available (Vít Ondruch) #36341 - [
cd20ecc7cb] - deps: upgrade Corepack to 0.10 (Maël Nison) #40374 - [
737df75e17] - (SEMVER-MINOR) deps: add corepack (Maël Nison) #39608 - [
b85aa5a143] - deps: upgrade npm to 6.14.16 (Ruy Adorno) #41603 - [
2755d391a5] - deps: update ICU to 70.1 (Michaël Zasso) #40658 - [
3089326d89] - deps: update archs files for OpenSSL-1.1.1m (Richard Lau) #41173 - [
59da7c12aa] - deps: upgrade openssl sources to 1.1.1m (Richard Lau) #41173 - [
cede1f26f6] - deps: add -fno-strict-aliasing flag to libuv (Daniel Bevenius) #40631 - [
4477da858f] - doc: fix corepack grammar for--forceflag (Steven) #40762 - [
5971d58600] - doc: add missing YAML tag inesm.md(Antoine du Hamel) #41516 - [
e903798ae1] - doc: add note regarding unfinished TLA (Antoine du Hamel) #41434 - [
a90defebcf] - esm: makeprocess.exit()default to exit code 0 (Gang Chen) #41388 - [
fc328f1ab0] - fs: nullish coalescing to respect zero positional reads (Omar El-Mihilmy) #40716 - [
004eafbebf] - (SEMVER-MINOR) lib: add unsubscribe method to non-active DC channels (simon-id) #40433 - [
625be7585d] - (SEMVER-MINOR) lib: add return value for DC channel.unsubscribe (simon-id) #40433 - [
2c365961d0] - module: support pattern trailers for imports field (Guy Bedford) #40041 - [
607bc74eae] - (SEMVER-MINOR) module: support pattern trailers (Guy Bedford) #39635 - [
f74fe2a59c] - (SEMVER-MINOR) src: make napi_create_reference accept symbol (JckXia) #39926 - [
b050c65885] - src: add option to disable loading native addons (Dominic Elm) #39977 - [
c1695ac68a] - tools: update certdata.txt (Richard Lau) #40280
v14.18.3
This is a security release.
Notable changes
Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)
Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.
Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.
More details will be available at CVE-2021-44531 after publication.
Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)
Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.
Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.
More details will be available at CVE-2021-44532 after publication.
Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)
Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.
Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
More details will be available at CVE-2021-44533 after publication.
Prototype pollution via console.table properties (Low)(CVE-2022-21824)
Due to the formatting logic of the console.table() function it was not safe to allow user controlled input to be passed to the properties parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be __proto__. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.
Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to.
More details will be available at CVE-2022-21824 after publication.
Thanks to Patrik Oldsberg (rugvip) for reporting this vulnerability.
Commits
- [
e2a74f3c99] - console: fix prototype pollution via console.table (Tobias Nießen) nodejs-private/node-private#307 - [
df1b2c33f6] - crypto,tls: implement safe x509 GeneralName format (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300 - [
9f2c52617f] - src: add cve reverts and associated tests (Michael Dawson and Akshay Kumar) nodejs-private/node-private#300 - [
b14be42518] - src: remove unused x509 functions (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300 - [
83d8f880bb] - tls: fix handling of x509 subject and issuer (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300 - [
461a0c674b] - tls: drop support for URI alternative names (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300
Configuration
📅 Schedule: Branch creation - "before 3am on the first day of the month" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, click this checkbox.
This PR has been generated by Mend Renovate. View repository job log here.