Commit Graph

99 Commits

Author SHA1 Message Date
Hirokazu MORIKAWA 853ea061b8 node: make hostpkg only
https://github.com/openwrt/packages/issues/26078
As a result of the discussion in this thread, the node.js package was changed to hostpkg only.
In addition, this fix uses the pre-built version distributed on nodejs.
The use of pre-build is based on the suggestion of @artynet.

The packages in the node module are successfully built, but the target node.js itself cannot be provided, so it cannot be used.

Yarn, which is used in packages for web front ends, etc., can be used without any problems.

Support for host builds other than linux x86_64.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2025-03-15 08:36:29 +02:00
Hannu Nyman baba458d52 node: mark BROKEN (to test impact on buildbot timeouts)
Mark node BROKEN to disable its build in buildbot in order
to test the impact on preventing frequent buildbot hangups.

It is suspected that node causes frequent build timeouts/hangups
on aarch/arm/i386/x86 builds: approx 1/3 of builds get timeouted.
Disable node for now to test the hypothesis.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2025-03-05 16:49:25 +02:00
Hirokazu MORIKAWA 21200cd083 node: bump to 22.14.0
Notable Changes

    [82a9000e9e] - crypto: update root certificates to NSS 3.107 (Node.js GitHub Bot) #56566
    [b7fe54fc88] - (SEMVER-MINOR) fs: allow exclude option in globs to accept glob patterns (Daeyeon Jeong) #56489
    [3ac92ef607] - (SEMVER-MINOR) lib: add typescript support to STDIN eval (Marco Ippolito) #56359
    [1614e8e7bc] - (SEMVER-MINOR) module: add ERR_UNSUPPORTED_TYPESCRIPT_SYNTAX (Marco Ippolito) #56610
    [6d6cffa9cc] - (SEMVER-MINOR) module: add findPackageJSON util (Jacob Smith) #55412
    [d35333ae18] - (SEMVER-MINOR) process: add process.ref() and process.unref() methods (James M Snell) #56400
    [07ff3ddcb5] - (SEMVER-MINOR) sqlite: support TypedArray and DataView in StatementSync (Alex Yang) #56385
    [94d3fe1b62] - (SEMVER-MINOR) src: add --disable-sigusr1 to prevent signal i/o thread (Rafael Gonzaga) #56441
    [5afffb4415] - (SEMVER-MINOR) src,worker: add isInternalWorker (Carlos Espa) #56469
    [697a851fb3] - (SEMVER-MINOR) test_runner: add TestContext.prototype.waitFor() (Colin Ihrig) #56595
    [047537b48c] - (SEMVER-MINOR) test_runner: add t.assert.fileSnapshot() (Colin Ihrig) #56459
    [926cf84e95] - (SEMVER-MINOR) test_runner: add assert.register() API (Colin Ihrig) #56434
    [c658a8afdf] - (SEMVER-MINOR) worker: add eval ts input (Marco Ippolito) #56394

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2025-02-17 18:51:17 +08:00
Hirokazu MORIKAWA 643afd8977 node: January 21, 2025 Security Releases
This is a security release.

Notable Changes

    CVE-2025-23083 - src,loader,permission: throw on InternalWorker use when permission model is enabled (High)
    CVE-2025-23085 - src: fix HTTP2 mem leak on premature close and ERR_PROTO (Medium)
    CVE-2025-23084 - path: fix path traversal in normalize() on Windows (Medium)

Dependency update:

    CVE-2025-22150 - Use of Insufficiently Random Values in undici fetch() (Medium)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2025-01-24 15:55:15 +08:00
Hirokazu MORIKAWA e6178717d7 node: remake - do not use shared abseil-cpp
remake this commit https://github.com/openwrt/packages/pull/25582

Fix nodejs compile errors after the introduction of abseil-cpp in #25565

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-12-30 11:32:05 +08:00
Alexandru Ardelean 031bf6f355 Revert "node: Do not use shared `abseil-cpp`"
This reverts commit 9e70d3c5b0.

As mentioned here:
   https://github.com/openwrt/packages/pull/25582#issuecomment-2561673222

Signed-off-by: Alexandru Ardelean <alex@shruggie.ro>
2024-12-26 13:35:49 +02:00
Austin Lane 9e70d3c5b0 node: Do not use shared `abseil-cpp`
Signed-off-by: Austin Lane <vidplace7@gmail.com>
2024-12-24 17:46:18 +02:00
Hirokazu MORIKAWA af7183fc30 node: upgrade to 22.11.0 LTS
Upgrade Version 22.11.0 'Jod' (LTS)

Notable Changes

This release marks the transition of Node.js 22.x into Long Term Support (LTS) with the codename 'Jod'. The 22.x release line now moves into "Active LTS" and will remain so until October 2025. After that time, it will move into "Maintenance" until end of life in April 2027.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-11-23 11:02:23 +02:00
Hirokazu MORIKAWA 1f17e41e43 node: Preparing to update ICU to 76
fix building with system icu 76

ICU 76 decided to reduce overlinking[^1] thus `icu-i18n` will no longer
add `icu-uc` when linking to shared libraries. This results in undefined
symbols/references when trying to build with system ICU 76.

[^1]: unicode-org/icu@199bc82

ref: https://github.com/nodejs/node/pull/55563

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-11-09 20:45:24 +02:00
Hirokazu MORIKAWA 6575ab559c node: bump to v20.18.0
Notable Changes
	Experimental Network Inspection Support in Node.js
	Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext
	New option for vm.createContext() to create a context with a freezable globalThis

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-10-09 15:16:42 +08:00
Hirokazu MORIKAWA 0d50f273b2 node: bump to v20.17.0
Notable Changes
	module: support require()ing synchronous ESM graphs
	path: add matchesGlob method
	stream: expose DuplexPair API

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-08-27 16:04:53 +08:00
Hirokazu MORIKAWA 4b426972f8 node: bump to v20.16.0
Notable Changes
	process: add process.getBuiltinModule(id)
	doc: doc-only deprecate OpenSSL engine-based APIs
	inspector: fix disable async hooks on Debugger.setAsyncCallStackDepth

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-08-08 21:40:32 +08:00
Hirokazu MORIKAWA ebc219db41 node: July 8, 2024 Security Releases
This is a security release.

Notable Changes

    CVE-2024-36138 - Bypass incomplete fix of CVE-2024-27980 (High)
    CVE-2024-22020 - Bypass network import restriction via data URL (Medium)
    CVE-2024-22018 - fs.lstat bypasses permission model (Low)
    CVE-2024-36137 - fs.fchown/fchmod bypasses permission model (Low)
    CVE-2024-37372 - Permission model improperly processes UNC paths (Low)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-07-10 10:36:48 +08:00
Hirokazu MORIKAWA a5e319df3d node: bump to v20.15.0
Notable Changes
* test_runner: support test plans
* inspector: introduce the --inspect-wait flag
* zlib: expose zlib.crc32()
* cli: allow running wasm in limited vmem with --disable-wasm-trap-handler

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-06-23 11:06:32 -07:00
Hirokazu MORIKAWA ff7f26e379 node: bump to v20.14.0
Notable Changes
* src,permission: throw async errors on async APIs (Rafael Gonzaga)
* (SEMVER-MINOR) test_runner: support forced exit (Colin Ihrig)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-06-03 16:35:03 +08:00
Hirokazu MORIKAWA fe8b0e85af node: bump to v20.13.1
Update to v20.13.1

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-05-14 05:01:33 -07:00
Hirokazu MORIKAWA de361e98d0 node: bump to v20.12.2
This is a security release.

Notable Changes
* CVE-2024-27980 - Command injection via args parameter of child_process.spawn without shell option enabled on Windows

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-04-24 17:53:22 +08:00
Hirokazu MORIKAWA ca3209a3b3 node: April 3, 2024 Security Releases
This is a security release
Notable Changes
* CVE-2024-27983 - Assertion failed in node::http2::Http2Session::~Http2Session() leads to HTTP/2 server crash- (High)
* CVE-2024-27982 - HTTP Request Smuggling via Content Length Obfuscation - (Medium)
* llhttp version 9.2.1
* undici version 5.28.4

Changed to use gz according to main-snapshot

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-04-07 18:01:08 +08:00
Hirokazu MORIKAWA 52e6017ad1 node: February 14 2024 Security Releases
Update to v20.11.1
This is a security release.

Notable changes
* CVE-2024-21892 - Code injection and privilege escalation through Linux capabilities- (High)
* CVE-2024-22019 - http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks- (High)
* CVE-2024-21896 - Path traversal by monkey-patching Buffer internals- (High)
* CVE-2024-22017 - setuid() does not drop all privileges due to io_uring - (High)
* CVE-2023-46809 - Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) - (Medium)
* CVE-2024-21891 - Multiple permission model bypasses due to improper path traversal sequence sanitization - (Medium)
* CVE-2024-21890 - Improper handling of wildcards in --allow-fs-read and --allow-fs-write (Medium)
* CVE-2024-22025 - Denial of Service by resource exhaustion in fetch() brotli decoding - (Medium)
* undici version 5.28.3
* libuv version 1.48.0
* OpenSSL version 3.0.13+quic1 (Depends on shared library provided by OpenWrt)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-02-16 15:46:33 +01:00
Hirokazu MORIKAWA 190542692d node: bump to v20.11.0
Notable Changes
* crypto: update root certificates to NSS 3.95 (Node.js GitHub Bot)
* doc: add MrJithil to collaborators (Jithil P Ponnan)
* doc: add Ethan-Arrowood as a collaborator (Ethan Arrowood)
* (SEMVER-MINOR) esm: add import.meta.dirname and import.meta.filename (James Sumners)
* fs: add c++ fast path for writeFileSync utf8 (CanadaHonk)
* (SEMVER-MINOR) module: remove useCustomLoadersIfPresent flag (Chengzhong Wu)
* (SEMVER-MINOR) module: bootstrap module loaders in shadow realm (Chengzhong Wu)
* (SEMVER-MINOR) src: add --disable-warning option (Ethan Arrowood)
* [SEMVER-MINOR) src: create per isolate proxy env template (Chengzhong Wu)
* (SEMVER-MINOR) src: make process binding data weak (Chengzhong Wu)
* stream: use Array for Readable buffer (Robert Nagy)
* stream: optimize creation (Robert Nagy)
* (SEMVER-MINOR) test_runner: adds built in lcov reporter (Phil Nash)
* (SEMVER-MINOR) test_runner: add Date to the supported mock APIs (Lucas Santos)
* (SEMVER-MINOR) test_runner, cli: add --test-timeout flag (Shubham Pandey)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-01-13 14:22:35 +08:00
Hirokazu MORIKAWA 41e500535c node: upgrade to v20.10.0
Notable Changes
* --experimental-default-type flag to flip module defaults
* Detect ESM syntax in ambiguous JavaScript
* New flush option in file system functions
* Experimental WebSocket client
* vm: fix V8 compilation cache support for vm.Script

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-11-30 12:57:55 +08:00
Hirokazu MORIKAWA 3e51eef14c node: upgrade to v20.9.0
node.js version 20.x is now active LTS.

mipsel (pistachio) is no longer supported.
Due to build difficulties, libuv shared libraries are not used.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-11-02 00:25:22 +08:00
Hirokazu MORIKAWA 9101a21e53 node: Friday October 13 2023 Security Releases
This is a security release.
Notable Changes
The following CVEs are fixed in this release:
* CVE-2023-44487: nghttp2 Security Release (High) (Depends on shared library provided by OpenWrt)
* CVE-2023-45143: undici Security Release (High)
* CVE-2023-38552: Integrity checks according to policies can be circumvented (Medium)
* CVE-2023-39333: Code injection via WebAssembly export names (Low)
More detailed information on each of the vulnerabilities can be found in October 2023 Security Releases blog post.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-10-17 18:14:09 +02:00
Hirokazu MORIKAWA b2079b87d1 node: bump to v18.18.1
Notable Changes

 This release addresses some regressions that appeared in Node.js 18.18.0:

    (Windows) FS can not handle certain characters in file name #48673
    18 and 20 node images give error - Text file busy (after re-build images) nodejs/docker-node#1968
    libuv update in 18.18.0 breaks webpack's thread-loader #49911

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-10-14 11:22:23 +08:00
Hirokazu MORIKAWA 8635545409 node: bump to v18.18.0
Update to v18.18.0

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-09-21 08:42:41 +08:00
Hirokazu MORIKAWA 23f3eb847d node: August 2023 Security Releases
Update to v18.17.1
This is a security release.

Notable Changes
The following CVEs are fixed in this release:
* CVE-2023-32002: Policies can be bypassed via Module._load (High)
* CVE-2023-32006: Policies can be bypassed by module.constructor.createRequire (Medium)
* CVE-2023-32559: Policies can be bypassed via process.binding (Medium)
* OpenSSL Security Releases  (Depends on shared library provided by OpenWrt)
    * OpenSSL security advisory 14th July.
    * OpenSSL security advisory 19th July.
    * OpenSSL security advisory 31st July

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-08-10 20:02:25 +03:00
Hirokazu MORIKAWA 2282d2e664 node: bump to v18.17.0
Notable Changes:
*Ada 2.0
 Node.js v18.17.0 comes with the latest version of the URL parser, Ada. This update brings significant performance improvements to URL parsing, including enhancements to the url.domainToASCII and url.domainToUnicode functions in node:url.

*Web Crypto API
 Web Crypto API functions' arguments are now coerced and validated as per their WebIDL definitions like in other Web Crypto API implementations. This further improves interoperability with other implementations of Web Crypto API.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-07-23 18:45:09 +08:00
Hirokazu MORIKAWA 286d1d11ae node: June 20 2023 Security Releases
Update to v18.16.1

The following CVEs are fixed in this release:
* CVE-2023-30581: mainModule.__proto__ Bypass Experimental Policy Mechanism (High)
* CVE-2023-30585: Privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (Medium)
* CVE-2023-30588: Process interuption due to invalid Public Key information in x509 certificates (Medium)
* CVE-2023-30589: HTTP Request Smuggling via Empty headers separated by CR (Medium)
* CVE-2023-30590: DiffieHellman does not generate keys after setting a private key (Medium)
* OpenSSL Security Releases (Depends on shared library provided by OpenWrt)
    * OpenSSL security advisory 28th March.
    * OpenSSL security advisory 20th April.
    * OpenSSL security advisory 30th May
* c-ares vulnerabilities: (Depends on shared library provided by OpenWrt)
    * GHSA-9g78-jv2r-p7vc
    * GHSA-8r8p-23f3-64c2
    * GHSA-54xr-f67r-4pc4
    * GHSA-x6mf-cxr9-8q6v

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-06-21 11:27:48 +09:00
Hirokazu MORIKAWA bc1ac271e8 node: bump to v18.16.0
Description:
Update to v18.16.0
Fixed a bug when selecting arm-fpu for vfpv3-d16.

Notable changes
Add initial support for single executable applications
Replace url parser with Ada

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-04-14 21:15:16 +08:00
Andre Heider 565866a472 treewide: refactor to use PKG_BUILD_FLAGS:=no-mips16
See commit 5c545bdb "treewide: replace PKG_USE_MIPS16:=0 with
PKG_BUILD_FLAGS:=no-mips16" on the main repository.

Signed-off-by: Andre Heider <a.heider@gmail.com>
2023-04-08 08:38:54 +02:00
Hirokazu MORIKAWA 94345b0325 node: bump to v18.15.0
Update to v18.15.0
Fixed bug using system-icu

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-03-21 17:29:35 +08:00
Hirokazu MORIKAWA 0ca0faafc4 node: bump to v18.14.2
Update to v18.14.2
Support for OpenSSL v3.0.x

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-02-27 10:56:04 +08:00
Hirokazu MORIKAWA 6cd5a2c57f node: bump to v16.19.1
Thursday February 16 2023 Security Releases

Notable Changes
The following CVEs are fixed in this release:
* CVE-2023-23918: Node.js Permissions policies can be bypassed via process.mainModule (High)
* CVE-2023-23919: Node.js OpenSSL error handling issues in nodejs crypto library (Medium)
* CVE-2023-23936: Fetch API in Node.js did not protect against CRLF injection in host headers (Medium)
* CVE-2023-24807: Regular Expression Denial of Service in Headers in Node.js fetch API (Low)
* CVE-2023-23920: Node.js insecure loading of ICU data through ICU_DATA environment variable (Low)
More detailed information on each of the vulnerabilities can be found in February 2023 Security Releases blog post.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-02-17 11:51:35 +09:00
Hirokazu MORIKAWA f8bd5eaa6e node: bump to v16.19.0
Notable Changes
*OpenSSL 1.1.1s
*Root certificates updated to NSS 3.85
*Time zone update to 2022f

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-12-22 16:25:53 -08:00
Hirokazu MORIKAWA 5851aa8062 node: bump to v16.18.0
Update to v16.18.0

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-10-23 18:35:47 +02:00
Hirokazu MORIKAWA 658621bf5e node: bump to v16.17.1
The following CVEs are fixed in this release:
* CVE-2022-32212: DNS rebinding in --inspect on macOS (High)
    * Insufficient fix for macOS devices on v18.5.0
* CVE-2022-32222: Node 18 reads openssl.cnf from /home/iojs/build/ upon startup on MacOS (Medium)
* CVE-2022-32213: HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (Medium)
    * Insufficient fix on v18.5.0
* CVE-2022-32215: HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)
    * Insufficient fix on v18.5.0
* CVE-2022-35256: HTTP Request Smuggling - Incorrect Parsing of Header Fields (Medium)
* CVE-2022-35255: Weak randomness in WebCrypto keygen
More detailed information on each of the vulnerabilities can be found in September 22nd 2022 Security Releases blog post.

llhttp updated to 6.0.10
llhttp is updated to 6.0.10 which includes fixes for the following vulnerabilities.
* HTTP Request Smuggling - CVE-2022-32213 bypass via obs-fold mechanic (Medium)(CVE-2022-32213 ): The llhttp parser in the http module does not correctly parse and validate Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
* HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)(CVE-2022-32215): The llhttp parser in the http module does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
* HTTP Request Smuggling - Incorrect Parsing of Header Fields (Medium)(CVE-35256): The llhttp parser in the http does not correctly handle header fields that are not terminated with CLRF. This can lead to HTTP Request Smuggling (HRS).

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-10-05 23:28:49 +02:00
Hirokazu MORIKAWA 841b38f37a node: bump to v16.17.0
Notable Changes:
Experimental command-line argument parser API
Experimental ESM Loader Hooks API
Experimental test runner
Improved interoperability of the Web Crypto API

Dependency updates:
Updated Corepack to 0.12.1
Updated ICU to 71.1
Updated npm to 8.15.0
Updated Undici to 5.8.0

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-08-23 08:24:51 +02:00
Hirokazu MORIKAWA 8db0d09823 node: July 7th 2022 Security Releases
Update to v16.16.0

Release for the following issues:
HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (Medium)(CVE-2022-32213)
HTTP Request Smuggling - Improper Delimiting of Header Fields (Medium)(CVE-2022-32214)
HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)(CVE-2022-32215)
DNS rebinding in --inspect via invalid IP addresses (High)(CVE-2022-32212)

https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/

No vulnerabilities related with openssl (uses system openssl)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-07-10 22:38:20 +02:00
Hirokazu MORIKAWA d8dc54ceea node: bump to v16.15.1
Upgrade npm to 8.11.0
Suppressed unnecessary builds.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-06-09 21:07:59 -07:00
Hirokazu MORIKAWA fcfd2599d9 node: bump to v16.15.0
Description:
Update from  v16.15.0
Changed handling of host's npm problems due to npm updates.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-05-31 23:14:52 -07:00
Hirokazu MORIKAWA 5beac54277 node: Major update from v14 to v16
This update also changes npm from v6 to v8.
This change also requires node module packages to be modified.
Each package will be updated later.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-04-16 11:00:20 -07:00
Hirokazu MORIKAWA 8278998e48 node: January 10th 2022 Security Releases
Update to v14.18.3

January 10th 2022 Security Releases:
Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)
Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)
Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)
Prototype pollution via console.table properties (Low)(CVE-2022-21824)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-01-24 15:44:05 -08:00
Hirokazu MORIKAWA f9c521251c node: bump to 14.18.2
Update to v14.18.2
Remove unneeded c-ares patches

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2021-12-10 08:57:11 +09:00
Hirokazu MORIKAWA da967b7536 node: bump to 14.18.1 / October 12th 2021 Security Releases
October 12th 2021 Security Releases:
 HTTP Request Smuggling due to spaced in headers (Medium)(CVE-2021-22959)
 HTTP Request Smuggling when parsing the body (Medium)(CVE-2021-22960)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2021-10-14 16:22:53 -07:00
Hirokazu MORIKAWA cee32c84af node: bump to 14.17.4
July 2021 Security Releases:

Use after free on close http2 on stream canceling (High) (CVE-2021-22930)
Node.js is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2021-07-31 11:28:02 +09:00
Hirokazu MORIKAWA 14b43da6bd node: bump to 14.17.1
Notable Changes:
deps: update ICU to 69.1 (Michaël Zasso)
errors: align source-map stacks with spec (Benjamin Coe)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2021-06-18 18:04:29 +09:00
Hirokazu MORIKAWA 3aefe1d8b6 node: Reduce node-npm package size
Reduce package size by about 1MB.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2021-05-28 13:04:48 +09:00
Hirokazu MORIKAWA 74521b2876 node: bump to v14.17.0
Notable Changes:
Diagnostics channel (experimental module)
UUID support in the crypto module
Experimental support for AbortController and AbortSignal

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2021-05-13 13:19:24 +09:00
Hirokazu MORIKAWA f6feb1508c node: Resolve ICU conflict
Resolve conflicts between OpenWrt's ICU package and the ICU shipped with node.js.

https://github.com/openwrt/packages/issues/15437

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2021-04-21 19:26:12 +03:00
Hirokazu MORIKAWA 21391a6c9c node: bump to v14.16.1
April 2021 Security Releases
- OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High) (CVE-2021-3450)
- OpenSSL - NULL pointer deref in signature_algorithms processing (High) (CVE-2021-3449)
- npm upgrade - Update y18n to fix Prototype-Pollution (High) (CVE-2020-7774)

OpenSSL-related vulnerabilities do not affect the OpenWrt package. Because OpenWrt's OpenSSL shared library has been updated.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2021-04-11 20:29:48 -07:00