From owner-dev-commits-ports-all@freebsd.org Tue Sep 21 20:28:42 2021 Return-Path: Delivered-To: dev-commits-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 59E5B67A559; Tue, 21 Sep 2021 20:28:42 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4HDY0n5sbqz4V5Q; Tue, 21 Sep 2021 20:28:41 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 3DCD428F9; Tue, 21 Sep 2021 20:28:41 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 18LKSfjB074070; Tue, 21 Sep 2021 20:28:41 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 18LKSfYO074069; Tue, 21 Sep 2021 20:28:41 GMT (envelope-from git) Date: Tue, 21 Sep 2021 20:28:41 GMT Message-Id: <202109212028.18LKSfYO074069@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: "Bradley T. Hughes" Subject: git: 25745a72b6b9 - main - security/vuxml: document Node.js August 2021 Security Releases MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: bhughes X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 25745a72b6b91dfe9aea29ef8e57aceadb8fed21 Auto-Submitted: auto-generated X-BeenThere: dev-commits-ports-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the ports repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Sep 2021 20:28:42 -0000 The branch main has been updated by bhughes: URL: https://cgit.FreeBSD.org/ports/commit/?id=25745a72b6b91dfe9aea29ef8e57aceadb8fed21 commit 25745a72b6b91dfe9aea29ef8e57aceadb8fed21 Author: Bradley T. Hughes AuthorDate: 2021-09-21 20:04:35 +0000 Commit: Bradley T. Hughes CommitDate: 2021-09-21 20:26:42 +0000 security/vuxml: document Node.js August 2021 Security Releases https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ Sponsored by: Miles AS --- security/vuxml/vuln-2021.xml | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index f209862c1241..c1e4db44a3e7 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,40 @@ + + Node.js -- August 2021 Security Releases + + + node14 + 14.17.4 + + + node + 16.6.2 + + + + +

Node.js reports:

+
+

cares upgrade - Improper handling of untypical characters in domain names (High) (CVE-2021-22931)

+

Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of host names returned by Domain Name Servers in the Node.js DNS library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.

+

Use after free on close http2 on stream canceling (High) (CVE-2021-22940)

+

Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. The issue is a follow on to CVE-2021-22930 as the issue was not completely resolved in the fix for CVE-2021-22930.

+

Incomplete validation of rejectUnauthorized parameter (Low) (CVE-2021-22939)

+

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.

+
+ +
+ + CVE-2021-22931 + CVE-2021-22940 + CVE-2021-22939 + https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ + + + 2021-08-11 + 2021-09-21 + +
+ Node.js -- July 2021 Security Releases (2)