@@ -89,6 +89,51 @@ officially supported platforms.
8989
9090_ To be written_
9191
92+ There are no hard and fast rules to determine if a bug is worth reporting as
93+ a security issue. The general rule is any issue worth reporting
94+ must allow an attacker to compromise the confidentiality, integrity
95+ or availability of the Node.js application or its system for which the attacker
96+ does not already have the capability.
97+
98+ To illustrate the point, here are some examples of past issues and what the
99+ Security Reponse Team thinks of them. When in doubt, however, please do send
100+ us a report nonetheless.
101+
102+
103+ ### Public disclosure preferred
104+
105+ - [ #14519 ] ( https://github.com/nodejs/node/issues/14519 ) : _ Internal domain
106+ function can be used to cause segfaults_ . Causing program termination using
107+ either the public Javascript APIs or the private bindings layer APIs requires
108+ the ability to execute arbitrary Javascript code, which is already the highest
109+ level of privilege possible.
110+
111+ - [ #12141 ] ( https://github.com/nodejs/node/pull/12141 ) : _ buffer: zero fill
112+ Buffer(num) by default_ . The buffer constructor behaviour was documented,
113+ but found to be prone to [ mis-use] ( https://snyk.io/blog/exploiting-buffer/ ) .
114+ It has since been changed, but despite much debate, was not considered misuse
115+ prone enough to justify fixing in older release lines and breaking our
116+ API stability contract.
117+
118+ ### Private disclosure preferred
119+
120+ - [ CVE-2016 -7099] ( https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ ) :
121+ _ Fix invalid wildcard certificate validation check_ . This is a high severity
122+ defect that would allow a malicious TLS server to serve an invalid wildcard
123+ certificate for its hostname and be improperly validated by a Node.js client.
124+
125+ - [ #5507 ] ( https://github.com/nodejs/node/pull/5507 ) : _ Fix a defect that makes
126+ the CacheBleed Attack possible_ . Many, though not all, OpenSSL vulnerabilities
127+ in the TLS/SSL protocols also effect Node.js.
128+
129+ - [ CVE-2016 -2216] ( https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/ ) :
130+ _ Fix defects in HTTP header parsing for requests and responses that can allow
131+ response splitting_ . While the impact of this vulnerability is application and
132+ network dependent, it is remotely exploitable in the HTTP protocol.
133+
134+ When in doubt, please do send us a report.
135+
136+
92137## Current Project Team Members
93138
94139_ To be written_
0 commit comments