Date: Wed, 19 Oct 2016 07:01:47 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 213603] www/node4: Update to 4.6.1 Message-ID: <bug-213603-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D213603 Bug ID: 213603 Summary: www/node4: Update to 4.6.1 Product: Ports & Packages Version: Latest Hardware: Any URL: https://nodejs.org/en/blog/release/v4.6.1/ OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: bradleythughes@fastmail.fm Attachment #175927 maintainer-approval+ Flags: Created attachment 175927 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D175927&action= =3Dedit nodejs 4.6.1 Bump to the latest upstream 4.x release. This is a security release to address the c-ares single-byte buffer overwrite, CVE-2016-5180. Note that www/node4 builds against a shared c-ares by default, so users should ensure to update dns/c-ares as well. https://nodejs.org/en/blog/release/v4.6.1/ https://nodejs.org/en/blog/vulnerability/october-2016-security-releases/ portlint: OK (-C, looks fine.) testport: OK (poudriere, 11.0-R, 10.[123]-R, 9.3-R, amd64/i386, default options) testport: OK (poudriere, 11.0-R, 10.[123]-R, 9.3-R, amd64/i386, BUNDLED_SSL enabled) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-213603-13>