Node v0.10.43 发布

oschina
 oschina
发布于 2016年03月04日
收藏 4

Node v0.10.43 发布了,更新日志如下

  • http_parser: Update to http-parser 1.2 to fix an unintentionally strict limitation of allowable header characters. (James M Snell) nodejs/node#5242

  • domains:

    • Prevent an exit due to an exception being thrown rather than emitting an 'uncaughtException' event on the process object when no error handler is set on the domain within which an error is thrown and an 'uncaughtException' event listener is set on process. (Julien Gilli) nodejs/node#3887

    • Fix an issue where the process would not abort in the proper function call if an error is thrown within a domain with no error handler and --abort-on-uncaught-exception is used. (Julien Gilli) nodejs/node#3887

  • openssl: Upgrade from 1.0.1r to 1.0.1s (Ben Noordhuis) nodejs/node#5508

    • Fix a double-free defect in parsing malformed DSA keys that may potentially be used for DoS or memory corruption attacks. It is likely to be very difficult to use this defect for a practical attack and is therefore considered low severity for Node.js users. More info is available at https://www.openssl.org/news/vulnerabilities.html#2016-0705

    • Fix a defect that can cause memory corruption in certain very rare cases relating to the internal BN_hex2bn() and BN_dec2bn() functions. It is believed that Node.js is not invoking the code paths that use these functions so practical attacks via Node.js using this defect are unlikely to be possible. More info is available at https://www.openssl.org/news/vulnerabilities.html#2016-0797

    • Fix a defect that makes the CacheBleed Attack (https://ssrg.nicta.com.au/projects/TS/cachebleed/) possible. This defect enables attackers to execute side-channel attacks leading to the potential recovery of entire RSA private keys. It only affects the Intel Sandy Bridge (and possibly older) microarchitecture when using hyper-threading. Newer microarchitectures, including Haswell, are unaffected. More info is available at https://www.openssl.org/news/vulnerabilities.html#2016-0702

    • Remove SSLv2 support, the --enable-ssl2 command line argument will now produce an error. The DROWN Attack (https://drownattack.com/) creates a vulnerability where SSLv2 is enabled by a server, even if a client connection is not using SSLv2. The SSLv2 protocol is widely considered unacceptably broken and should not be supported. More information is available at https://www.openssl.org/news/vulnerabilities.html#2016-0800


    提交记录:

本站文章除注明转载外,均为本站原创或编译。欢迎任何形式的转载,但请务必注明出处,尊重他人劳动共创开源社区。
转载请注明:文章转载自 OSCHINA 社区 [http://www.oschina.net]
本文标题:Node v0.10.43 发布
加载中

最新评论(11

卖萌的程序猿
卖萌的程序猿

引用来自“neo-chen”的评论

PHP7 Swoole 已经超越 Node.js 性能。

引用来自“eechen”的评论

岂止Swoole,连PHP内置用于开发的CLI HTTP Server都能轻虐Node:
Node.JS vs PHP5 CLI Server 简单的HTTP服务器性能测试
http://my.oschina.net/eechen/blog/369470
Redis set/get测试,100并发,Node也就Apache(PHP5)的水平.
静态测试,直接被PHP5 CLI Server吊打,被PHP5 Swoole暴虐!
拿异步和同步测,拿new对象,拼接字符串的js和文本的php我也是醉了
noday
noday
node是啥
eyas
eyas

引用来自“okoala”的评论

Node 和 PHP 又不冲突,而且现在 Node 又不只是做 Server。争谁牛逼有什么用,谁都不掉谁~
说的是啊,我用js写前端应用和移动应用和桌面应用,不用多学一门语言
okoala
okoala
Node 和 PHP 又不冲突,而且现在 Node 又不只是做 Server。争谁牛逼有什么用,谁都不掉谁~
eechen
eechen

引用来自“neo-chen”的评论

PHP7 Swoole 已经超越 Node.js 性能。
岂止Swoole,连PHP内置用于开发的CLI HTTP Server都能轻虐Node:
Node.JS vs PHP5 CLI Server 简单的HTTP服务器性能测试
http://my.oschina.net/eechen/blog/369470
Redis set/get测试,100并发,Node也就Apache(PHP5)的水平.
静态测试,直接被PHP5 CLI Server吊打,被PHP5 Swoole暴虐!
llj1985
llj1985
就是看不惯node这么乱的版本,采用php的。
netkiller-
netkiller-
PHP7 Swoole 已经超越 Node.js 性能。
景愿
景愿
各种类库的版本已经很忧伤,TM工具还这么多版本,前端真累
wfifi
wfifi
为了使用各版本系列的程序员安心吧,要是只更最大版,其他版本收不到BUG修复应该会很忧伤!
洛阳码农
eechen还有30秒到达战场
返回顶部
顶部