technologiestiftung / lab-site

Website for the Ideation & Prototyping Lab
https://lab.technologiestiftung-berlin.de
MIT License
6 stars 2 forks source link

chore(deps): update node.js to v14.17.3 #348

Closed renovate[bot] closed 3 years ago

renovate[bot] commented 3 years ago

WhiteSource Renovate

This PR contains the following updates:

Package Update Change
node patch 14.17.1 -> 14.17.3

Release Notes

nodejs/node ### [`v14.17.3`](https://togithub.com/nodejs/node/releases/v14.17.3) [Compare Source](https://togithub.com/nodejs/node/compare/v14.17.2...v14.17.3) ##### Notable Changes Node.js 14.17.2 introduced a regression in the Windows installer on non-English locales that is being fixed in this release. There is no need to download this release if you are not using the Windows installer. ##### Commits - \[[`0f00104a2c`](https://togithub.com/nodejs/node/commit/0f00104a2c)] - **win,msi**: use localized "Authenticated Users" name (Richard Lau) [#​39241](https://togithub.com/nodejs/node/pull/39241) ### [`v14.17.2`](https://togithub.com/nodejs/node/releases/v14.17.2) [Compare Source](https://togithub.com/nodejs/node/compare/v14.17.1...v14.17.2) This is a security release. ##### Notable Changes Vulnerabilities fixed: - **CVE-2021-22918**: libuv upgrade - Out of bounds read (Medium) - Node.js is vulnerable to out-of-bounds read in libuv's uv\_\_idna_toascii() function which is used to convert strings to ASCII. This is called by Node's dns module's lookup() function and can lead to information disclosures or crashes. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918 - **CVE-2021-22921**: Windows installer - Node Installer Local Privilege Escalation (Medium) - Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22921 ##### Commits - \[[`a7496aba0a`](https://togithub.com/nodejs/node/commit/a7496aba0a)] - **deps**: uv: cherry-pick [`99c29c9`](https://togithub.com/nodejs/node/commit/99c29c9c2c9b) (Ben Noordhuis) [nodejs-private/node-private#​267](https://togithub.com/nodejs-private/node-private/pull/267) - \[[`d0b449da1d`](https://togithub.com/nodejs/node/commit/d0b449da1d)] - **win,msi**: set install directory permission (AkshayK) [nodejs-private/node-private#​269](https://togithub.com/nodejs-private/node-private/pull/269)

Configuration

📅 Schedule: "every 2 weeks on Monday before 7am" in timezone Europe/Berlin.

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.

🔕 Ignore: Close this PR and you won't be reminded about this update again.



This PR has been generated by WhiteSource Renovate. View repository job log here.

netlify[bot] commented 3 years ago

✔️ Deploy Preview for tsb-labsite ready!

🔨 Explore the source changes: 4ac235b74315a51a9c1034bb474e2ad3f81112d4

🔍 Inspect the deploy log: https://app.netlify.com/sites/tsb-labsite/deploys/60f6c4431702040007134e34

😎 Browse the preview: https://deploy-preview-348--tsb-labsite.netlify.app