aboutsummaryrefslogtreecommitdiff
path: root/lang/node/patches
diff options
context:
space:
mode:
authorHirokazu MORIKAWA <morikw2@gmail.com>2023-06-21 11:27:48 +0900
committerHirokazu MORIKAWA <morikw2@gmail.com>2023-06-21 11:27:48 +0900
commit286d1d11ae451e9e90897aacd7ae20ec76e2cab5 (patch)
treea08ef69e6c1e7e1c4a067dedc039303b6acceeac /lang/node/patches
parent9536d28384d0d924e8b03ce42dbc2d61ce4174d0 (diff)
node: June 20 2023 Security Releases
Update to v18.16.1 The following CVEs are fixed in this release: * CVE-2023-30581: mainModule.__proto__ Bypass Experimental Policy Mechanism (High) * CVE-2023-30585: Privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (Medium) * CVE-2023-30588: Process interuption due to invalid Public Key information in x509 certificates (Medium) * CVE-2023-30589: HTTP Request Smuggling via Empty headers separated by CR (Medium) * CVE-2023-30590: DiffieHellman does not generate keys after setting a private key (Medium) * OpenSSL Security Releases (Depends on shared library provided by OpenWrt) * OpenSSL security advisory 28th March. * OpenSSL security advisory 20th April. * OpenSSL security advisory 30th May * c-ares vulnerabilities: (Depends on shared library provided by OpenWrt) * GHSA-9g78-jv2r-p7vc * GHSA-8r8p-23f3-64c2 * GHSA-54xr-f67r-4pc4 * GHSA-x6mf-cxr9-8q6v Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
Diffstat (limited to 'lang/node/patches')
-rw-r--r--lang/node/patches/003-path.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/lang/node/patches/003-path.patch b/lang/node/patches/003-path.patch
index a1103be0d..8e390d88c 100644
--- a/lang/node/patches/003-path.patch
+++ b/lang/node/patches/003-path.patch
@@ -1,6 +1,6 @@
--- a/lib/internal/modules/cjs/loader.js
+++ b/lib/internal/modules/cjs/loader.js
-@@ -1389,7 +1389,8 @@ Module._initPaths = function() {
+@@ -1391,7 +1391,8 @@ Module._initPaths = function() {
path.resolve(process.execPath, '..') :
path.resolve(process.execPath, '..', '..');