NodeJS 4.x LTS
Evented I/O for V8 JavaScript
This version no longer supported
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout devel:languages:nodejs/nodejs4 && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
8334.diff | 0000001717 1.68 KB | |
CVE-2018-12115.patch | 0000002782 2.72 KB | |
CVE-2018-12116.patch | 0000011242 11 KB | |
CVE-2018-12120.patch | 0000010800 10.5 KB | |
CVE-2018-12123.patch | 0000002663 2.6 KB | |
SHASUMS256.txt | 0000003576 3.49 KB | |
SHASUMS256.txt.sig | 0000000310 310 Bytes | |
bash_output_helper.bash | 0000000306 306 Bytes | |
env_shebang.patch | 0000014489 14.1 KB | |
fix_ci_ssl_tests.patch | 0000000728 728 Bytes | |
fix_ci_tests.patch | 0000004398 4.29 KB | |
flaky_test_rerun.patch | 0000000733 733 Bytes | |
icu_61_namespacefix.patch | 0000002712 2.65 KB | |
node-gyp-addon-gypi.patch | 0000003100 3.03 KB | |
node-v4.9.1.tar.xz | 0013250164 12.6 MB | |
nodejs-libpath.patch | 0000002887 2.82 KB | |
nodejs-sle11-python26-check_output.patch | 0000001317 1.29 KB | |
nodejs.keyring | 0000025336 24.7 KB | |
nodejs4.changes | 0000020435 20 KB | |
nodejs4.spec | 0000018996 18.6 KB | |
npm_search_paths.patch | 0000002262 2.21 KB | |
openssl_1_0_2p.patch | 0003851005 3.67 MB | |
test-ca-bumps.patch | 0000140889 138 KB | |
versioned.patch | 0000013990 13.7 KB |
Revision 99 (latest revision is 110)
Adam Majer (adamm)
committed
(revision 99)
Backport security fixes from NodeJS 6.x: * debugger: prevent the debugger from listening on 0.0.0.0. It now defaults to 127.0.0.1. CVE-2018-12120.patch - (CVE-2018-12120, bsc#1117625) * http: + Two-byte characters are now strictly disallowed for the path option in HTTP client requests. Paths containing characters outside of the range \u0021 - \u00ff will now be rejected with a TypeError. This behavior can be reverted if necessary by supplying the --security-revert=CVE-2018-12116 command line argument (this is not recommended). CVE-2018-12116.patch - (CVE-2018-12116, bsc#1117630) * util: Fix a bug that would allow a hostname being spoofed when parsing URLs with url.parse() with the 'javascript:' protocol. CVE-2018-12123.patch - (CVE-2018-12123, bnc#1117629)
Comments 0