Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

dependencies: Update all non-major and non-minor dependencies #660

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Aug 8, 2021

This PR contains the following updates:

Package Change Age Adoption Passing Confidence Type Update
@angular-builders/custom-webpack (source) 12.1.0 -> 12.1.3 age adoption passing confidence devDependencies patch
@angular/flex-layout 12.0.0-beta.34 -> 12.0.0-beta.35 age adoption passing confidence dependencies patch
@metamask/detect-provider ^1.2.0 -> 1.2.0 age adoption passing confidence dependencies pin
@types/jasminewd2 (source) 2.0.10 -> 2.0.13 age adoption passing confidence devDependencies patch
crypto-browserify 3.12.0 -> 3.12.1 age adoption passing confidence dependencies patch
karma-jasmine 4.0.1 -> 4.0.2 age adoption passing confidence devDependencies patch
ngx-clipboard 14.0.1 -> 14.0.2 age adoption passing confidence dependencies patch
node (source) 12.22.4 -> 12.22.12 age adoption passing confidence patch

Release Notes

just-jeb/angular-builders (@​angular-builders/custom-webpack)

v12.1.3

Compare Source

Note: Version bump only for package @​angular-builders/custom-webpack

v12.1.2

Compare Source

Note: Version bump only for package @​angular-builders/custom-webpack

v12.1.1

Compare Source

Note: Version bump only for package @​angular-builders/custom-webpack

angular/flex-layout (@​angular/flex-layout)

v12.0.0-beta.35

Compare Source

Allow usage of RxJS v7 with the v12 release.

browserify/crypto-browserify (crypto-browserify)

v3.12.1

Compare Source

karma-runner/karma-jasmine (karma-jasmine)

v4.0.2

Compare Source

Bug Fixes
  • sync package-lock.json and package.json (4dacc5d)
nodejs/node (node)

v12.22.12: 2022-04-05, Version 12.22.12 'Erbium' (LTS), @​richardlau

Compare Source

Notable Changes

This is planned to be the final Node.js 12 release. Node.js 12 will
reach End-of-Life status on 30 April 2022, after which it will no
receive updates. You are strongly advised to migrate your applications
to Node.js 16 or 14 (both of which are Long Term Support (LTS) releases)
to continue to receive future security updates beyond 30 April 2022.

This release fixes a shutdown crash in Node-API (formerly N-API) and a
potential stack overflow when using vm.runInNewContext().

The list of GPG keys used to sign releases and instructions on how to
fetch the keys for verifying binaries has been synchronized with the
main branch.

Commits

v12.22.11: 2022-03-17, Version 12.22.11 'Erbium' (LTS), @​richardlau

Compare Source

This is a security release.

Notable changes

Update to OpenSSL 1.1.1n, which addresses the following vulnerability:

Fix for building Node.js 12.x with Visual Studio 2019 to allow us to continue to
run CI tests.

Commits

v12.22.10: 2022-02-01, Version 12.22.10 'Erbium' (LTS), @​ruyadorno

Compare Source

Notable changes
  • Upgrade npm to 6.14.16
  • Updated ICU time zone data
Commits

v12.22.9: 2022-01-10, Version 12.22.9 'Erbium' (LTS), @​richardlau

Compare Source

This is a security release.

Notable changes
Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)

Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.

Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.

More details will be available at CVE-2021-44531 after publication.

Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)

Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.

Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.

More details will be available at CVE-2021-44532 after publication.

Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)

Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.

Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.

More details will be available at CVE-2021-44533 after publication.

Prototype pollution via console.table properties (Low)(CVE-2022-21824)

Due to the formatting logic of the console.table() function it was not safe to allow user controlled input to be passed to the properties parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be __proto__. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.

Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to.

More details will be available at CVE-2022-21824 after publication.

Thanks to Patrik Oldsberg (rugvip) for reporting this vulnerability.

Commits

v12.22.8: 2021-12-16, Version 12.22.8 'Erbium' (LTS), @​richardlau

Compare Source

Notable Changes

This release contains a c-ares update to fix a regression introduced in
Node.js 12.22.5 resolving CNAME records containing underscores
#​39780.

Root certificates have been updated to those from Mozilla's Network
Security Services 3.71 #​40281.

Commits

v12.22.7: 2021-10-12, Version 12.22.7 'Erbium' (LTS), @​danielleadams

Compare Source

This is a security release.

Notable changes
  • CVE-2021-22959: HTTP Request Smuggling due to spaced in headers (Medium)
    • The http parser accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS). More details will be available at CVE-2021-22959 after publication.
  • CVE-2021-22960: HTTP Request Smuggling when parsing the body (Medium)
    • The parse ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions. More details will be available at CVE-2021-22960 after publication.
Commits

v12.22.6: 2021-08-31, Version 12.22.6 'Erbium' (LTS), @​MylesBorins

Compare Source

This is a security release.

Notable Changes

These are vulnerabilities in the node-tar, arborist, and npm cli modules which
are related to the initial reports and subsequent remediation of node-tar
vulnerabilities CVE-2021-32803
and CVE-2021-32804.
Subsequent internal security review of node-tar and additional external bounty
reports have resulted in another 5 CVE being remediated in core npm CLI
dependencies including node-tar, and npm arborist.

You can read more about it in:

Commits

v12.22.5: 2021-08-11, Version 12.22.5 'Erbium' (LTS), @​BethGriggs

Compare Source

This is a security release.

Notable Changes
  • CVE-2021-3672/CVE-2021-22931: Improper handling of untypical characters in domain names (High)
    • Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library which can lead to the output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library. You can read more about it at https://nvd.nist.gov/vuln/detail/CVE-2021-22931.
  • CVE-2021-22940: Use after free on close http2 on stream canceling (High)
  • CVE-2021-22939: Incomplete validation of rejectUnauthorized parameter (Low)
    • If the Node.js HTTPS API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted. You can read more about it at https://nvd.nist.gov/vuln/detail/CVE-2021-22939.
Commits

Configuration

📅 Schedule: Branch creation - "before 8am on thursday" in timezone Europe/Berlin, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the dependencies Pull requests that update a dependency file label Aug 8, 2021
@CLAassistant
Copy link

CLAassistant commented Aug 8, 2021

CLA assistant check
All committers have signed the CLA.

@renovate renovate bot force-pushed the renovate/all-patch branch 2 times, most recently from b469626 to 0becc6a Compare August 11, 2021 16:36
@renovate renovate bot changed the title dependencies: Lock file maintenance all non-major and non-minor dependencies dependencies: Update all non-major and non-minor dependencies Aug 11, 2021
@renovate renovate bot force-pushed the renovate/all-patch branch 25 times, most recently from 7fb8f78 to 6f1f492 Compare August 13, 2021 07:57
@renovate renovate bot force-pushed the renovate/all-patch branch 22 times, most recently from 7a5f8c8 to c83d06d Compare April 23, 2022 02:55
@renovate renovate bot force-pushed the renovate/all-patch branch from c83d06d to 44c0288 Compare June 18, 2022 14:13
@codecov
Copy link

codecov bot commented Jun 18, 2022

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 95.77%. Comparing base (7a7916b) to head (7888b31).

Additional details and impacted files

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #660   +/-   ##
=======================================
  Coverage   95.77%   95.77%           
=======================================
  Files          95       95           
  Lines        2508     2508           
  Branches      334      334           
=======================================
  Hits         2402     2402           
  Misses         58       58           
  Partials       48       48           

Continue to review full report in Codecov by Sentry.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 7a7916b...7888b31. Read the comment docs.

@renovate renovate bot force-pushed the renovate/all-patch branch from 44c0288 to e043443 Compare September 25, 2022 14:02
@renovate renovate bot force-pushed the renovate/all-patch branch from e043443 to 5f3b1ad Compare September 15, 2023 23:05
@renovate renovate bot force-pushed the renovate/all-patch branch from 5f3b1ad to 804eb96 Compare October 18, 2023 08:50
@renovate renovate bot force-pushed the renovate/all-patch branch from 804eb96 to 3b929e9 Compare November 7, 2023 10:13
@renovate renovate bot force-pushed the renovate/all-patch branch from 3b929e9 to 7888b31 Compare October 22, 2024 18:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant