Skip to content

Commit c6f3374

Browse files
sam-githubaddaleax
authored andcommitted
doc: describe what security issues are
PR-URL: nodejs#14485 Reviewed-By: Gibson Fahnestock <[email protected]> Reviewed-By: Michael Dawson <[email protected]>
1 parent 146c8f3 commit c6f3374

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed

README.md

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,51 @@ officially supported platforms.
8989

9090
_To be written_
9191

92+
There are no hard and fast rules to determine if a bug is worth reporting as
93+
a security issue. The general rule is any issue worth reporting
94+
must allow an attacker to compromise the confidentiality, integrity
95+
or availability of the Node.js application or its system for which the attacker
96+
does not already have the capability.
97+
98+
To illustrate the point, here are some examples of past issues and what the
99+
Security Reponse Team thinks of them. When in doubt, however, please do send
100+
us a report nonetheless.
101+
102+
103+
### Public disclosure preferred
104+
105+
- [#14519](https://github.com/nodejs/node/issues/14519): _Internal domain
106+
function can be used to cause segfaults_. Causing program termination using
107+
either the public Javascript APIs or the private bindings layer APIs requires
108+
the ability to execute arbitrary Javascript code, which is already the highest
109+
level of privilege possible.
110+
111+
- [#12141](https://github.com/nodejs/node/pull/12141): _buffer: zero fill
112+
Buffer(num) by default_. The buffer constructor behaviour was documented,
113+
but found to be prone to [mis-use](https://snyk.io/blog/exploiting-buffer/).
114+
It has since been changed, but despite much debate, was not considered misuse
115+
prone enough to justify fixing in older release lines and breaking our
116+
API stability contract.
117+
118+
### Private disclosure preferred
119+
120+
- [CVE-2016-7099](https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/):
121+
_Fix invalid wildcard certificate validation check_. This is a high severity
122+
defect that would allow a malicious TLS server to serve an invalid wildcard
123+
certificate for its hostname and be improperly validated by a Node.js client.
124+
125+
- [#5507](https://github.com/nodejs/node/pull/5507): _Fix a defect that makes
126+
the CacheBleed Attack possible_. Many, though not all, OpenSSL vulnerabilities
127+
in the TLS/SSL protocols also effect Node.js.
128+
129+
- [CVE-2016-2216](https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/):
130+
_Fix defects in HTTP header parsing for requests and responses that can allow
131+
response splitting_. While the impact of this vulnerability is application and
132+
network dependent, it is remotely exploitable in the HTTP protocol.
133+
134+
When in doubt, please do send us a report.
135+
136+
92137
## Current Project Team Members
93138

94139
_To be written_

0 commit comments

Comments
 (0)