Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 19 Oct 2016 07:01:47 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 213603] www/node4: Update to 4.6.1
Message-ID:  <bug-213603-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D213603

            Bug ID: 213603
           Summary: www/node4: Update to 4.6.1
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: https://nodejs.org/en/blog/release/v4.6.1/
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: bradleythughes@fastmail.fm
 Attachment #175927 maintainer-approval+
             Flags:

Created attachment 175927
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D175927&action=
=3Dedit
nodejs 4.6.1

Bump to the latest upstream 4.x release. This is a security release to
address the c-ares single-byte buffer overwrite, CVE-2016-5180. Note
that www/node4 builds against a shared c-ares by default, so users
should ensure to update dns/c-ares as well.

https://nodejs.org/en/blog/release/v4.6.1/
https://nodejs.org/en/blog/vulnerability/october-2016-security-releases/

portlint: OK (-C, looks fine.)
testport: OK (poudriere, 11.0-R, 10.[123]-R, 9.3-R, amd64/i386, default
options)
testport: OK (poudriere, 11.0-R, 10.[123]-R, 9.3-R, amd64/i386, BUNDLED_SSL
enabled)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-213603-13>