From a8b33c447c82aa41385490383ed963e7ae63263c Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Aug 24 2022 23:06:00 +0000 Subject: import nodejs-14.20.0-2.module+el8.6.0+16231+7c1b33d9 --- diff --git a/.gitignore b/.gitignore index f881379..751ebb7 100644 --- a/.gitignore +++ b/.gitignore @@ -1,2 +1,2 @@ -SOURCES/icu4c-69_1-src.tgz -SOURCES/node-v14.18.2-stripped.tar.gz +SOURCES/icu4c-70_1-src.tgz +SOURCES/node-v14.20.0-stripped.tar.gz diff --git a/.nodejs.metadata b/.nodejs.metadata index 6dbf0a6..d868ff8 100644 --- a/.nodejs.metadata +++ b/.nodejs.metadata @@ -1,2 +1,2 @@ -620a71c84428758376baa0fb81a581c3daa866ce SOURCES/icu4c-69_1-src.tgz -bba4efed29ee2e3e9078b955890d9b68f6750f6a SOURCES/node-v14.18.2-stripped.tar.gz +f7c1363edee6be7de8b624ffbb801892b3417d4e SOURCES/icu4c-70_1-src.tgz +66dc4b75e2e416d064f12be3450fc7953d72b21b SOURCES/node-v14.20.0-stripped.tar.gz diff --git a/SOURCES/0001-deps-ansi-regex-fix-potential-ReDoS.patch b/SOURCES/0001-deps-ansi-regex-fix-potential-ReDoS.patch new file mode 100644 index 0000000..3287b6c --- /dev/null +++ b/SOURCES/0001-deps-ansi-regex-fix-potential-ReDoS.patch @@ -0,0 +1,46 @@ +From e12dad58e7c749d65d51e2dd49dece4102ddfa18 Mon Sep 17 00:00:00 2001 +From: rpm-build +Date: Thu, 9 Dec 2021 15:48:46 +0100 +Subject: [PATCH] deps(ansi-regex): fix potential ReDoS + +This is the upstream fix [1] applied to all applicable bundled deps. + +[1]: https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9 + +Fixes: CVE-2021-3807 +Signed-off-by: rpm-build +--- + .../node_modules/string-width/node_modules/ansi-regex/index.js | 2 +- + deps/npm/node_modules/yargs/node_modules/ansi-regex/index.js | 2 +- + 2 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/deps/npm/node_modules/string-width/node_modules/ansi-regex/index.js b/deps/npm/node_modules/string-width/node_modules/ansi-regex/index.js +index c4aaecf..7d32201 100644 +--- a/deps/npm/node_modules/string-width/node_modules/ansi-regex/index.js ++++ b/deps/npm/node_modules/string-width/node_modules/ansi-regex/index.js +@@ -2,7 +2,7 @@ + + module.exports = () => { + const pattern = [ +- '[\\u001B\\u009B][[\\]()#;?]*(?:(?:(?:[a-zA-Z\\d]*(?:;[a-zA-Z\\d]*)*)?\\u0007)', ++ '[\\u001B\\u009B][[\\]()#;?]*(?:(?:(?:(?:;[-a-zA-Z\\d\\/#&.:=?%@~_]+)*|[a-zA-Z\\d]+(?:;[-a-zA-Z\\d\\/#&.:=?%@~_]*)*)?\\u0007)', + '(?:(?:\\d{1,4}(?:;\\d{0,4})*)?[\\dA-PRZcf-ntqry=><~]))' + ].join('|'); + +diff --git a/deps/npm/node_modules/yargs/node_modules/ansi-regex/index.js b/deps/npm/node_modules/yargs/node_modules/ansi-regex/index.js +index c254480..9e37ec3 100644 +--- a/deps/npm/node_modules/yargs/node_modules/ansi-regex/index.js ++++ b/deps/npm/node_modules/yargs/node_modules/ansi-regex/index.js +@@ -6,7 +6,7 @@ module.exports = options => { + }, options); + + const pattern = [ +- '[\\u001B\\u009B][[\\]()#;?]*(?:(?:(?:[a-zA-Z\\d]*(?:;[-a-zA-Z\\d\\/#&.:=?%@~_]*)*)?\\u0007)', ++ '[\\u001B\\u009B][[\\]()#;?]*(?:(?:(?:(?:;[-a-zA-Z\\d\\/#&.:=?%@~_]+)*|[a-zA-Z\\d]+(?:;[-a-zA-Z\\d\\/#&.:=?%@~_]*)*)?\\u0007)', + '(?:(?:\\d{1,4}(?:;\\d{0,4})*)?[\\dA-PR-TZcf-ntqry=><~]))' + ].join('|'); + +-- +2.36.1 + + diff --git a/SOURCES/0004-always-available-fips-options.patch b/SOURCES/0004-always-available-fips-options.patch deleted file mode 100644 index 26d4853..0000000 --- a/SOURCES/0004-always-available-fips-options.patch +++ /dev/null @@ -1,624 +0,0 @@ -From 7c7f5159fcc71d915dfcc5f97ab18d5f8912f1b5 Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?V=C3=ADt=20Ondruch?= -Date: Tue, 25 Aug 2020 14:04:54 +0200 -Subject: [PATCH] crypto: make FIPS related options always awailable -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -There is no reason to hide FIPS functionality behind build flags. -OpenSSL always provide the information about FIPS availability via -`FIPS_mode()` function. - -This makes the user experience more consistent, because the OpenSSL -library is always queried and the `crypto.getFips()` always returns -OpenSSL settings. - -Fixes #34903 - -PR-URL: https://github.com/nodejs/node/pull/36341 -Reviewed-By: Anna Henningsen -Reviewed-By: Michael Dawson -Reviewed-By: Daniel Bevenius -Signed-off-by: Jan Staněk -Signed-off-by: rpm-build ---- - doc/api/cli.md | 8 +-- - lib/crypto.js | 22 ++---- - node.gypi | 3 - - src/node.cc | 6 +- - src/node_config.cc | 2 - - src/node_crypto.cc | 45 +++++++----- - src/node_options.cc | 2 - - src/node_options.h | 2 - - test/parallel/test-cli-node-print-help.js | 7 +- - test/parallel/test-crypto-fips.js | 71 +++++++++---------- - ...rocess-env-allowed-flags-are-documented.js | 11 +-- - 11 files changed, 74 insertions(+), 105 deletions(-) - -diff --git a/doc/api/cli.md b/doc/api/cli.md -index a8ef339..c41bd49 100644 ---- a/doc/api/cli.md -+++ b/doc/api/cli.md -@@ -182,8 +182,8 @@ code from strings throw an exception instead. This does not affect the Node.js - added: v6.0.0 - --> - --Enable FIPS-compliant crypto at startup. (Requires Node.js to be built with --`./configure --openssl-fips`.) -+Enable FIPS-compliant crypto at startup. (Requires Node.js to be built -+against FIPS-compatible OpenSSL.) - - ### `--enable-source-maps` - - - Load an OpenSSL configuration file on startup. Among other uses, this can be --used to enable FIPS-compliant crypto if Node.js is built with --`./configure --openssl-fips`. -+used to enable FIPS-compliant crypto if Node.js is built -+against FIPS-enabled OpenSSL. - - ### `--pending-deprecation` -