Skip to content

Commit 82facfb

Browse files
Trottdanielleadams
authored andcommitted
doc: final round of markdown format changes
Once the README and find-inactive-collaborators.mjs changes land here, we can introduce markdown formatting as a step in the toolchain somewhere. Before this lands, nodejs/node-core-utils#578 will need to land and be included in a node-core-utils release. PR-URL: #40645 Reviewed-By: Antoine du Hamel <[email protected]> Reviewed-By: Michaël Zasso <[email protected]>
1 parent fe1b6fb commit 82facfb

10 files changed

+2444
-272
lines changed

README.md

+245-245
Large diffs are not rendered by default.

doc/api/esm.md

+16-16
Original file line numberDiff line numberDiff line change
@@ -1110,21 +1110,21 @@ The resolver can throw the following errors:
11101110
> **PACKAGE\_SELF\_RESOLVE**(_packageName_, _packageSubpath_, _parentURL_).
11111111
> 10. If _selfUrl_ is not **undefined**, return _selfUrl_.
11121112
> 11. While _parentURL_ is not the file system root,
1113-
> 1. Let _packageURL_ be the URL resolution of _"node_modules/"_
1114-
> concatenated with _packageSpecifier_, relative to _parentURL_.
1115-
> 2. Set _parentURL_ to the parent folder URL of _parentURL_.
1116-
> 3. If the folder at _packageURL_ does not exist, then
1117-
> 1. Continue the next loop iteration.
1118-
> 4. Let _pjson_ be the result of **READ\_PACKAGE\_JSON**(_packageURL_).
1119-
> 5. If _pjson_ is not **null** and _pjson_._exports_ is not **null** or
1120-
> **undefined**, then
1121-
> 1. Return the result of **PACKAGE\_EXPORTS\_RESOLVE**(_packageURL_,
1122-
> _packageSubpath_, _pjson.exports_, _defaultConditions_).
1123-
> 6. Otherwise, if _packageSubpath_ is equal to _"."_, then
1124-
> 1. If _pjson.main_ is a string, then
1125-
> 1. Return the URL resolution of _main_ in _packageURL_.
1126-
> 7. Otherwise,
1127-
> 1. Return the URL resolution of _packageSubpath_ in _packageURL_.
1113+
> 1. Let _packageURL_ be the URL resolution of _"node\_modules/"_
1114+
> concatenated with _packageSpecifier_, relative to _parentURL_.
1115+
> 2. Set _parentURL_ to the parent folder URL of _parentURL_.
1116+
> 3. If the folder at _packageURL_ does not exist, then
1117+
> 1. Continue the next loop iteration.
1118+
> 4. Let _pjson_ be the result of **READ\_PACKAGE\_JSON**(_packageURL_).
1119+
> 5. If _pjson_ is not **null** and _pjson_._exports_ is not **null** or
1120+
> **undefined**, then
1121+
> 1. Return the result of **PACKAGE\_EXPORTS\_RESOLVE**(_packageURL_,
1122+
> _packageSubpath_, _pjson.exports_, _defaultConditions_).
1123+
> 6. Otherwise, if _packageSubpath_ is equal to _"."_, then
1124+
> 1. If _pjson.main_ is a string, then
1125+
> 1. Return the URL resolution of _main_ in _packageURL_.
1126+
> 7. Otherwise,
1127+
> 1. Return the URL resolution of _packageSubpath_ in _packageURL_.
11281128
> 12. Throw a _Module Not Found_ error.
11291129

11301130
**PACKAGE\_SELF\_RESOLVE**(_packageName_, _packageSubpath_, _parentURL_)
@@ -1257,7 +1257,7 @@ _internal_, _conditions_)
12571257
> 1. Return **PACKAGE\_RESOLVE**(_target_ with every instance of
12581258
> _"\*"_ replaced by _subpath_, _packageURL_ + _"/"_).
12591259
> 2. Return **PACKAGE\_RESOLVE**(_target_ + _subpath_,
1260-
> _packageURL_ + _"/"_)_.
1260+
> _packageURL_ + _"/"_).
12611261
> 2. Otherwise, throw an _Invalid Package Target_ error.
12621262
> 3. If _target_ split on _"/"_ or _"\\"_ contains any _"."_, _".."_ or
12631263
> _"node\_modules"_ segments after the first segment, case insensitive and

doc/api/n-api.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1009,8 +1009,8 @@ The content of the `napi_extended_error_info` returned is only valid up until
10091009
a Node-API function is called on the same `env`. This includes a call to
10101010
`napi_is_exception_pending` so it may often be necessary to make a copy
10111011
of the information so that it can be used later. The pointer returned
1012-
in error_message points to a statically defined string so it is safe to use
1013-
that pointer if you have copied it out of the error_message field (which will
1012+
in `error_message` points to a statically-defined string so it is safe to use
1013+
that pointer if you have copied it out of the `error_message` field (which will
10141014
be overwritten) before another Node-API function was called.
10151015

10161016
Do not rely on the content or format of any of the extended information as it

doc/changelogs/CHANGELOG_V12.md

+149
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,155 @@
7373
* [io.js](CHANGELOG\_IOJS.md)
7474
* [Archive](CHANGELOG\_ARCHIVE.md)
7575

76+
<a id="12.22.7"></a>
77+
78+
## 2021-10-12, Version 12.22.7 'Erbium' (LTS), @danielleadams
79+
80+
This is a security release.
81+
82+
### Notable changes
83+
84+
* **CVE-2021-22959**: HTTP Request Smuggling due to spaced in headers (Medium)
85+
* The http parser accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS). More details will be available at [CVE-2021-22959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959) after publication.
86+
* **CVE-2021-22960**: HTTP Request Smuggling when parsing the body (Medium)
87+
* The http parser ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions. More details will be available at [CVE-2021-22960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960) after publication.
88+
89+
### Commits
90+
91+
* \[[`21a2e554e3`](https://github.com/nodejs/node/commit/21a2e554e3)] - **deps**: update llhttp to 2.1.4 (Fedor Indutny) [nodejs-private/node-private#286](https://github.com/nodejs-private/node-private/pull/286)
92+
* \[[`d5d3a03246`](https://github.com/nodejs/node/commit/d5d3a03246)] - **http**: add regression test for smuggling content length (Matteo Collina) [nodejs-private/node-private#286](https://github.com/nodejs-private/node-private/pull/286)
93+
* \[[`0858587f21`](https://github.com/nodejs/node/commit/0858587f21)] - **http**: add regression test for chunked smuggling (Matteo Collina) [nodejs-private/node-private#286](https://github.com/nodejs-private/node-private/pull/286)
94+
95+
<a id="12.22.6"></a>
96+
97+
## 2021-08-31, Version 12.22.6 'Erbium' (LTS), @MylesBorins
98+
99+
This is a security release.
100+
101+
### Notable Changes
102+
103+
These are vulnerabilities in the node-tar, arborist, and npm cli modules which
104+
are related to the initial reports and subsequent remediation of node-tar
105+
vulnerabilities [CVE-2021-32803](https://github.com/advisories/GHSA-r628-mhmh-qjhw)
106+
and [CVE-2021-32804](https://github.com/advisories/GHSA-3jfq-g458-7qm9).
107+
Subsequent internal security review of node-tar and additional external bounty
108+
reports have resulted in another 5 CVE being remediated in core npm CLI
109+
dependencies including node-tar, and npm arborist.
110+
111+
You can read more about it in:
112+
113+
* [CVE-2021-37701](https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc)
114+
* [CVE-2021-37712](https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p)
115+
* [CVE-2021-37713](https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh)
116+
* [CVE-2021-39134](https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc)
117+
* [CVE-2021-39135](https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2)
118+
119+
### Commits
120+
121+
* \[[`a0154b586b`](https://github.com/nodejs/node/commit/a0154b586b)] - **deps**: update archs files for OpenSSL-1.1.1l (Richard Lau) [#39869](https://github.com/nodejs/node/pull/39869)
122+
* \[[`7a95637eb7`](https://github.com/nodejs/node/commit/7a95637eb7)] - **deps**: upgrade openssl sources to 1.1.1l (Richard Lau) [#39869](https://github.com/nodejs/node/pull/39869)
123+
* \[[`840b0ffff6`](https://github.com/nodejs/node/commit/840b0ffff6)] - **deps**: upgrade npm to 6.14.15 (Darcy Clarke) [#39856](https://github.com/nodejs/node/pull/39856)
124+
125+
<a id="12.22.5"></a>
126+
127+
## 2021-08-11, Version 12.22.5 'Erbium' (LTS), @BethGriggs
128+
129+
This is a security release.
130+
131+
### Notable Changes
132+
133+
* **CVE-2021-3672/CVE-2021-22931**: Improper handling of untypical characters in domain names (High)
134+
* Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library which can lead to the output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library. You can read more about it at <https://nvd.nist.gov/vuln/detail/CVE-2021-22931>.
135+
* **CVE-2021-22940**: Use after free on close http2 on stream canceling (High)
136+
* Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. This release includes a follow-up fix for CVE-2021-22930 as the issue was not completely resolved by the previous fix. You can read more about it at <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940>.
137+
* **CVE-2021-22939**: Incomplete validation of rejectUnauthorized parameter (Low)
138+
* If the Node.js HTTPS API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted. You can read more about it at <https://nvd.nist.gov/vuln/detail/CVE-2021-22939>.
139+
140+
### Commits
141+
142+
* \[[`5f947db68c`](https://github.com/nodejs/node/commit/5f947db68c)] - **deps**: update c-ares to 1.17.2 (Beth Griggs) [#39724](https://github.com/nodejs/node/pull/39724)
143+
* \[[`42695ea34b`](https://github.com/nodejs/node/commit/42695ea34b)] - **deps**: reflect c-ares source tree (Beth Griggs) [#39653](https://github.com/nodejs/node/pull/39653)
144+
* \[[`e4c9156b32`](https://github.com/nodejs/node/commit/e4c9156b32)] - **deps**: apply missed updates from c-ares 1.17.1 (Beth Griggs) [#39653](https://github.com/nodejs/node/pull/39653)
145+
* \[[`9cd1f53103`](https://github.com/nodejs/node/commit/9cd1f53103)] - **http2**: add tests for cancel event while client is paused reading (Akshay K) [#39622](https://github.com/nodejs/node/pull/39622)
146+
* \[[`2008c9722f`](https://github.com/nodejs/node/commit/2008c9722f)] - **http2**: update handling of rst\_stream with error code NGHTTP2\_CANCEL (Akshay K) [#39622](https://github.com/nodejs/node/pull/39622)
147+
* \[[`1780bbc329`](https://github.com/nodejs/node/commit/1780bbc329)] - **tls**: validate "rejectUnauthorized: undefined" (Matteo Collina) [nodejs-private/node-private#276](https://github.com/nodejs-private/node-private/pull/276)
148+
149+
<a id="12.22.4"></a>
150+
151+
## 2021-07-29, Version 12.22.4 'Erbium' (LTS), @richardlau
152+
153+
This is a security release.
154+
155+
### Notable Changes
156+
157+
* **CVE-2021-22930**: Use after free on close http2 on stream canceling (High)
158+
* Node.js is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior. You can read more about it in <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930>
159+
160+
### Commits
161+
162+
* \[[`499e56babe`](https://github.com/nodejs/node/commit/499e56babe)] - **build**: fix label-pr workflow (Michaël Zasso) [#38399](https://github.com/nodejs/node/pull/38399)
163+
* \[[`98ac3c4108`](https://github.com/nodejs/node/commit/98ac3c4108)] - **build**: label PRs with GitHub Action instead of nodejs-github-bot (Phillip Johnsen) [#38301](https://github.com/nodejs/node/pull/38301)
164+
* \[[`ddc8dde150`](https://github.com/nodejs/node/commit/ddc8dde150)] - **deps**: upgrade npm to 6.14.14 (Darcy Clarke) [#39553](https://github.com/nodejs/node/pull/39553)
165+
* \[[`e11a862eed`](https://github.com/nodejs/node/commit/e11a862eed)] - **deps**: update to c-ares 1.17.1 (Danny Sonnenschein) [#36207](https://github.com/nodejs/node/pull/36207)
166+
* \[[`39e9cd540f`](https://github.com/nodejs/node/commit/39e9cd540f)] - **deps**: restore minimum ICU version to 65 (Richard Lau) [#39068](https://github.com/nodejs/node/pull/39068)
167+
* \[[`e459c79b02`](https://github.com/nodejs/node/commit/e459c79b02)] - **deps**: V8: cherry-pick 035c305ce776 (Michaël Zasso) [#38497](https://github.com/nodejs/node/pull/38497)
168+
* \[[`b3c698a5d8`](https://github.com/nodejs/node/commit/b3c698a5d8)] - **deps**: update to cjs-module-lexer\@1.2.1 (Guy Bedford) [#38450](https://github.com/nodejs/node/pull/38450)
169+
* \[[`7d5a2f9588`](https://github.com/nodejs/node/commit/7d5a2f9588)] - **deps**: update to cjs-module-lexer\@1.1.1 (Guy Bedford) [#37992](https://github.com/nodejs/node/pull/37992)
170+
* \[[`906b43e586`](https://github.com/nodejs/node/commit/906b43e586)] - **deps**: V8: update build dependencies (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
171+
* \[[`15b91fa3fa`](https://github.com/nodejs/node/commit/15b91fa3fa)] - **deps**: V8: backport 895949419186 (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
172+
* \[[`8046daf09f`](https://github.com/nodejs/node/commit/8046daf09f)] - **deps**: V8: cherry-pick 0b3a4ecf7083 (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
173+
* \[[`f4377b13a6`](https://github.com/nodejs/node/commit/f4377b13a6)] - **deps**: V8: cherry-pick 7c182bd65f42 (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
174+
* \[[`add7b5b4c2`](https://github.com/nodejs/node/commit/add7b5b4c2)] - **deps**: V8: cherry-pick cc641f6be756 (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
175+
* \[[`a73275f056`](https://github.com/nodejs/node/commit/a73275f056)] - **deps**: V8: cherry-pick 7b3332844212 (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
176+
* \[[`492b0d6b37`](https://github.com/nodejs/node/commit/492b0d6b37)] - **deps**: V8: cherry-pick e6f62a41f5ee (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
177+
* \[[`2b54156260`](https://github.com/nodejs/node/commit/2b54156260)] - **deps**: V8: cherry-pick 92e6d3317082 (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
178+
* \[[`bbceab4d91`](https://github.com/nodejs/node/commit/bbceab4d91)] - **deps**: V8: backport 1b1eda0876aa (Michaël Zasso) [#39245](https://github.com/nodejs/node/pull/39245)
179+
* \[[`93a1a3c5ae`](https://github.com/nodejs/node/commit/93a1a3c5ae)] - **deps**: V8: cherry-pick 530080c44af2 (Milad Fa) [#38509](https://github.com/nodejs/node/pull/38509)
180+
* \[[`b263f2585a`](https://github.com/nodejs/node/commit/b263f2585a)] - **http2**: on receiving rst\_stream with cancel code add it to pending list (Akshay K) [#39423](https://github.com/nodejs/node/pull/39423)
181+
* \[[`3e4bc1b0d3`](https://github.com/nodejs/node/commit/3e4bc1b0d3)] - **module**: fix legacy `node` specifier resolution to resolve `"main"` field (Antoine du Hamel) [#38979](https://github.com/nodejs/node/pull/38979)
182+
* \[[`f552c45676`](https://github.com/nodejs/node/commit/f552c45676)] - **src**: move CHECK in AddIsolateFinishedCallback (Fedor Indutny) [#38010](https://github.com/nodejs/node/pull/38010)
183+
* \[[`30ce0e66ae`](https://github.com/nodejs/node/commit/30ce0e66ae)] - **src**: update cares\_wrap OpenBSD defines (Anna Henningsen) [#38670](https://github.com/nodejs/node/pull/38670)
184+
185+
<a id="12.22.3"></a>
186+
187+
## 2021-07-05, Version 12.22.3 'Erbium' (LTS), @richardlau
188+
189+
### Notable Changes
190+
191+
Node.js 12.22.2 introduced a regression in the Windows installer on
192+
non-English locales that is being fixed in this release. There is no
193+
need to download this release if you are not using the Windows
194+
installer.
195+
196+
### Commits
197+
198+
* \[[`182f86a4d4`](https://github.com/nodejs/node/commit/182f86a4d4)] - **win,msi**: use localized "Authenticated Users" name (Richard Lau) [#39241](https://github.com/nodejs/node/pull/39241)
199+
200+
<a id="12.22.2"></a>
201+
202+
## 2021-07-01, Version 12.22.2 'Erbium' (LTS), @richardlau
203+
204+
This is a security release.
205+
206+
### Notable Changes
207+
208+
Vulnerabilities fixed:
209+
210+
* **CVE-2021-22918**: libuv upgrade - Out of bounds read (Medium)
211+
* Node.js is vulnerable to out-of-bounds read in libuv's uv\_\_idna\_toascii() function which is used to convert strings to ASCII. This is called by Node's dns module's lookup() function and can lead to information disclosures or crashes. You can read more about it in <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918>
212+
* **CVE-2021-22921**: Windows installer - Node Installer Local Privilege Escalation (Medium)
213+
* Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking. You can read more about it in <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22921>
214+
* **CVE-2021-27290**: npm upgrade - ssri Regular Expression Denial of Service (ReDoS) (High)
215+
* This is a vulnerability in the ssri npm mudule which may be vulnerable to denial of service attacks. You can read more about it in <https://github.com/advisories/GHSA-vx3p-948g-6vhq>
216+
* **CVE-2021-23362**: npm upgrade - hosted-git-info Regular Expression Denial of Service (ReDoS) (Medium)
217+
* This is a vulnerability in the hosted-git-info npm mudule which may be vulnerable to denial of service attacks. You can read more about it in <https://nvd.nist.gov/vuln/detail/CVE-2021-23362>
218+
219+
### Commits
220+
221+
* \[[`623fd1fcb5`](https://github.com/nodejs/node/commit/623fd1fcb5)] - **deps**: uv: cherry-pick 99c29c9c2c9b (Ben Noordhuis) [nodejs-private/node-private#267](https://github.com/nodejs-private/node-private/pull/267)
222+
* \[[`923b3760f8`](https://github.com/nodejs/node/commit/923b3760f8)] - **deps**: upgrade npm to 6.14.13 (Ruy Adorno) [#38214](https://github.com/nodejs/node/pull/38214)
223+
* \[[`a52790cba0`](https://github.com/nodejs/node/commit/a52790cba0)] - **win,msi**: set install directory permission (AkshayK) [nodejs-private/node-private#269](https://github.com/nodejs-private/node-private/pull/269)
224+
76225
<a id="12.22.1"></a>
77226

78227
## 2021-04-06, Version 12.22.1 'Erbium' (LTS), @mylesborins

0 commit comments

Comments
 (0)