SHA256
1
0
forked from pool/nodejs22

[info=7393343f2b6c21ebcf36568e2895e5eba0b24b70e7749223d57207b6957f9869]

OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs22?expand=0&rev=14
This commit is contained in:
OBS User unknown 2024-10-28 16:20:59 +00:00 committed by Git OBS Bridge
parent 9469ebacd2
commit d4c227477f
3 changed files with 22 additions and 9 deletions

View File

@ -1,3 +1,3 @@
mtime: 1730124038
commit: c048babd9930b593640d38543c098a4dee7440ab73e2f85685ab1602b5383c09
mtime: 1730132426
commit: 7393343f2b6c21ebcf36568e2895e5eba0b24b70e7749223d57207b6957f9869
url: https://src.opensuse.org/nodejs/nodejs22.git

View File

@ -113,3 +113,16 @@ Index: node-v22.10.0/test/parallel/test-crypto-dh.js
}
}
Index: node-v22.10.0/test/parallel/test-dns.js
===================================================================
--- node-v22.10.0.orig/test/parallel/test-dns.js
+++ node-v22.10.0/test/parallel/test-dns.js
@@ -403,7 +403,7 @@ assert.throws(() => {
const server = dgram.createSocket('udp4');
- server.on('message', common.mustCall((msg, { address, port }) => {
+ server.on('message', common.mustCallAtLeast((msg, { address, port }) => {
const parsed = dnstools.parseDNSPacket(msg);
const domain = parsed.questions[0].domain;
assert.strictEqual(domain, 'example.org');

View File

@ -58,11 +58,11 @@ Mon Oct 28 11:43:07 UTC 2024 - Adam Majer <adam.majer@suse.de>
* worker: add postMessageToThread
- Changes since 22.4.1:
* CVE-2024-36138 - Bypass incomplete fix of CVE-2024-27980 (High)
* CVE-2024-22020 - Bypass network import restriction via data URL (Medium)
* CVE-2024-22018 - fs.lstat bypasses permission model (Low)
* CVE-2024-36137 - fs.fchown/fchmod bypasses permission model (Low)
* CVE-2024-37372 - Permission model improperly processes UNC paths (Low)
* (CVE-2024-36138, bsc#1227560) - Bypass incomplete fix of CVE-2024-27980 (High)
* (CVE-2024-22020, bsc#1227554) - Bypass network import restriction via data URL (Medium)
* (CVE-2024-22018, bsc#1227562) - fs.lstat bypasses permission model (Low)
* (CVE-2024-36137, bsc#1227561) - fs.fchown/fchmod bypasses permission model (Low)
* (CVE-2024-37372, bsc#1227563) - Permission model improperly processes UNC paths (Low)
- Changes since 22.4.0:
* deps,lib,src: add experimental web storage
@ -72,8 +72,8 @@ Mon Oct 28 11:43:07 UTC 2024 - Adam Majer <adam.majer@suse.de>
* util: support --no- for argument with boolean type for parseArgs
- fix_ci_tests.patch, linker_lto_jobs.patch, versioned.patch,
qemu_timeouts_arches.patch: refreshed
- fix_ci_tests.patch: refreshed, add compat for c-ares 1.30
- linker_lto_jobs.patch, versioned.patch, qemu_timeouts_arches.patch: refreshed
-------------------------------------------------------------------
Fri Jun 14 10:58:52 UTC 2024 - Adam Majer <adam.majer@suse.de>