NodeJS 4.x LTS
Evented I/O for V8 JavaScript
This version no longer supported
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout devel:languages:nodejs/nodejs4 && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
8334.diff | 0000001717 1.68 KB | |
CVE-2018-12115.patch | 0000002782 2.72 KB | |
CVE-2018-12116.patch | 0000011242 11 KB | |
CVE-2018-12120.patch | 0000010800 10.5 KB | |
CVE-2018-12121.patch | 0000007290 7.12 KB | |
CVE-2018-12122.patch | 0000010132 9.89 KB | |
CVE-2018-12123.patch | 0000002663 2.6 KB | |
SHASUMS256.txt | 0000003576 3.49 KB | |
SHASUMS256.txt.sig | 0000000310 310 Bytes | |
bash_output_helper.bash | 0000000306 306 Bytes | |
env_shebang.patch | 0000014489 14.1 KB | |
fix_ci_ssl_tests.patch | 0000000728 728 Bytes | |
fix_ci_tests.patch | 0000004398 4.29 KB | |
flaky_test_rerun.patch | 0000000733 733 Bytes | |
icu_61_namespacefix.patch | 0000002712 2.65 KB | |
max_header_size.patch | 0000023123 22.6 KB | |
node-gyp-addon-gypi.patch | 0000003100 3.03 KB | |
node-v4.9.1.tar.xz | 0013250164 12.6 MB | |
nodejs-libpath.patch | 0000002887 2.82 KB | |
nodejs-sle11-python26-check_output.patch | 0000001317 1.29 KB | |
nodejs.keyring | 0000025336 24.7 KB | |
nodejs4.changes | 0000021219 20.7 KB | |
nodejs4.spec | 0000019147 18.7 KB | |
npm_search_paths.patch | 0000002262 2.21 KB | |
openssl_1_0_2p.patch | 0003851005 3.67 MB | |
test-ca-bumps.patch | 0000140889 138 KB | |
versioned.patch | 0000013990 13.7 KB |
Revision 101 (latest revision is 110)
Adam Majer (adamm)
committed
(revision 101)
* cli: add --max-http-header-size flag (max_header_size.patch) + add maxHeaderSize property (max_header_size.patch) (CVE-2018-12121.patch - CVE-2018-12121, bsc#1117626) + A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with server.headersTimeout. Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with server.setTimeout(), this aids in protecting against excessive resource retention and possible Denial of Service. (CVE-2018-12122.patch - CVE-2018-12122, bsc#1117627) (CVE-2018-12116.patch - CVE-2018-12116, bsc#1117630) (CVE-2018-12123.patch - CVE-2018-12123, bnc#1117629)
Comments 0