nestjs / nestjs.com

The official website https://nestjs.com 🏆
https://nestjs.com
MIT License
137 stars 23 forks source link

chore(deps): update node.js to v14.17.3 #52

Closed renovate[bot] closed 3 years ago

renovate[bot] commented 3 years ago

WhiteSource Renovate

This PR contains the following updates:

Package Update Change
node patch 14.17.1 -> 14.17.3

Release Notes

nodejs/node ### [`v14.17.3`](https://togithub.com/nodejs/node/releases/v14.17.3) [Compare Source](https://togithub.com/nodejs/node/compare/v14.17.2...v14.17.3) ##### Notable Changes Node.js 14.17.2 introduced a regression in the Windows installer on non-English locales that is being fixed in this release. There is no need to download this release if you are not using the Windows installer. ##### Commits - \[[`0f00104a2c`](https://togithub.com/nodejs/node/commit/0f00104a2c)] - **win,msi**: use localized "Authenticated Users" name (Richard Lau) [#​39241](https://togithub.com/nodejs/node/pull/39241) ### [`v14.17.2`](https://togithub.com/nodejs/node/releases/v14.17.2) [Compare Source](https://togithub.com/nodejs/node/compare/v14.17.1...v14.17.2) This is a security release. ##### Notable Changes Vulnerabilities fixed: - **CVE-2021-22918**: libuv upgrade - Out of bounds read (Medium) - Node.js is vulnerable to out-of-bounds read in libuv's uv\_\_idna_toascii() function which is used to convert strings to ASCII. This is called by Node's dns module's lookup() function and can lead to information disclosures or crashes. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918 - **CVE-2021-22921**: Windows installer - Node Installer Local Privilege Escalation (Medium) - Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22921 ##### Commits - \[[`a7496aba0a`](https://togithub.com/nodejs/node/commit/a7496aba0a)] - **deps**: uv: cherry-pick [`99c29c9`](https://togithub.com/nodejs/node/commit/99c29c9c2c9b) (Ben Noordhuis) [nodejs-private/node-private#​267](https://togithub.com/nodejs-private/node-private/pull/267) - \[[`d0b449da1d`](https://togithub.com/nodejs/node/commit/d0b449da1d)] - **win,msi**: set install directory permission (AkshayK) [nodejs-private/node-private#​269](https://togithub.com/nodejs-private/node-private/pull/269)

Configuration

📅 Schedule: At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.



This PR has been generated by WhiteSource Renovate. View repository job log here.