Date: Fri, 24 Jun 2016 10:31:36 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 210521] [maintainer][patch] www/node012: 0.12.14 -> 0.12.15 Message-ID: <bug-210521-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D210521 Bug ID: 210521 Summary: [maintainer][patch] www/node012: 0.12.14 -> 0.12.15 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Keywords: patch Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: bradleythughes@fastmail.fm Keywords: patch Created attachment 171744 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D171744&action= =3Dedit patch from a git commit, apply with patch -p1 Notable changes: This is a security release. All Node.js users should consult the security release summary at https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/ for details on patched vulnerabilities. - libuv: (CVE-2014-9748) Fixes a bug in the read/write locks implementation for Windows XP and Windows 2003 that can lead to undefined and potentially unsafe behaviour. More information can be found at https://github.com/libuv/libuv/issues/515 or at https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/. - V8: (CVE-2016-1669) Fixes a potential Buffer overflow vulnerability discovered in V8, more details can be found in the CVE at https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2016-1669 or at https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/. See the full release announcement here: https://nodejs.org/en/blog/release/v0.12.15/ --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-210521-13>