aboutsummaryrefslogtreecommitdiff
path: root/lang/node/patches/003-path.patch
diff options
context:
space:
mode:
authorHirokazu MORIKAWA <morikw2@gmail.com>2023-02-17 11:51:35 +0900
committerHirokazu MORIKAWA <morikw2@gmail.com>2023-02-17 11:51:35 +0900
commit6cd5a2c57f8120d4b65518ee0dee559d4fe2c75c (patch)
tree7d3b73ee420258177ca268fd3afa5c45ce2e291e /lang/node/patches/003-path.patch
parent70009d3586721e656eaab6d935ac4e30dc615ad8 (diff)
node: bump to v16.19.1
Thursday February 16 2023 Security Releases Notable Changes The following CVEs are fixed in this release: * CVE-2023-23918: Node.js Permissions policies can be bypassed via process.mainModule (High) * CVE-2023-23919: Node.js OpenSSL error handling issues in nodejs crypto library (Medium) * CVE-2023-23936: Fetch API in Node.js did not protect against CRLF injection in host headers (Medium) * CVE-2023-24807: Regular Expression Denial of Service in Headers in Node.js fetch API (Low) * CVE-2023-23920: Node.js insecure loading of ICU data through ICU_DATA environment variable (Low) More detailed information on each of the vulnerabilities can be found in February 2023 Security Releases blog post. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
Diffstat (limited to 'lang/node/patches/003-path.patch')
-rw-r--r--lang/node/patches/003-path.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/lang/node/patches/003-path.patch b/lang/node/patches/003-path.patch
index 42e07f2cd..d3183cb66 100644
--- a/lang/node/patches/003-path.patch
+++ b/lang/node/patches/003-path.patch
@@ -1,6 +1,6 @@
--- a/lib/internal/modules/cjs/loader.js
+++ b/lib/internal/modules/cjs/loader.js
-@@ -1300,7 +1300,8 @@ Module._initPaths = function() {
+@@ -1326,7 +1326,8 @@ Module._initPaths = function() {
path.resolve(process.execPath, '..') :
path.resolve(process.execPath, '..', '..');