Skip to content

Commit fa84164

Browse files
warnerp18targos
authored andcommitted
doc: add SECURITY.md to readme.md
This adds a SECURITY.md file and links to the security document per the request of @https://github.com/Trott at a recent SF Node meetup. PR-URL: #24031 Reviewed-By: Rich Trott <rtrott@gmail.com> Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com> Reviewed-By: Refael Ackermann <refack@gmail.com> Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
1 parent e8078f2 commit fa84164

File tree

2 files changed

+39
-37
lines changed

2 files changed

+39
-37
lines changed

README.md

+2-37
Original file line numberDiff line numberDiff line change
@@ -159,43 +159,8 @@ source and a list of supported platforms.
159159

160160
## Security
161161

162-
If you find a security vulnerability in Node.js, please report it to
163-
security@nodejs.org. Please withhold public disclosure until after the security
164-
team has addressed the vulnerability.
165-
166-
The security team will acknowledge your email within 24 hours. You will receive
167-
a more detailed response within 48 hours.
168-
169-
There are no hard and fast rules to determine if a bug is worth reporting as a
170-
security issue. Here are some examples of past issues and what the Security
171-
Response Team thinks of them. When in doubt, please do send us a report
172-
nonetheless.
173-
174-
175-
### Public disclosure preferred
176-
177-
- [#14519](https://github.com/nodejs/node/issues/14519): _Internal domain
178-
function can be used to cause segfaults_. Requires the ability to execute
179-
arbitrary JavaScript code. That is already the highest level of privilege
180-
possible.
181-
182-
### Private disclosure preferred
183-
184-
- [CVE-2016-7099](https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/):
185-
_Fix invalid wildcard certificate validation check_. This was a high-severity
186-
defect. It caused Node.js TLS clients to accept invalid wildcard certificates.
187-
188-
- [#5507](https://github.com/nodejs/node/pull/5507): _Fix a defect that makes
189-
the CacheBleed Attack possible_. Many, though not all, OpenSSL vulnerabilities
190-
in the TLS/SSL protocols also affect Node.js.
191-
192-
- [CVE-2016-2216](https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/):
193-
_Fix defects in HTTP header parsing for requests and responses that can allow
194-
response splitting_. This was a remotely-exploitable defect in the Node.js
195-
HTTP implementation.
196-
197-
When in doubt, please do send us a report.
198-
162+
For information on reporting security vulnerabilities in Node.js, see
163+
[SECURITY.md](./SECURITY.md).
199164

200165
## Current Project Team Members
201166

SECURITY.md

+37
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
# Security
2+
3+
If you find a security vulnerability in Node.js, please report it to
4+
security@nodejs.org. Please withhold public disclosure until after the security
5+
team has addressed the vulnerability.
6+
7+
The security team will acknowledge your email within 24 hours. You will receive
8+
a more detailed response within 48 hours.
9+
10+
There are no hard and fast rules to determine if a bug is worth reporting as a
11+
security issue. Here are some examples of past issues and what the Security
12+
Response Team thinks of them. When in doubt, please do send us a report
13+
nonetheless.
14+
15+
## Public disclosure preferred
16+
17+
- [#14519](https://github.com/nodejs/node/issues/14519): _Internal domain
18+
function can be used to cause segfaults_. Requires the ability to execute
19+
arbitrary JavaScript code. That is already the highest level of privilege
20+
possible.
21+
22+
## Private disclosure preferred
23+
24+
- [CVE-2016-7099](https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/):
25+
_Fix invalid wildcard certificate validation check_. This was a high-severity
26+
defect. It caused Node.js TLS clients to accept invalid wildcard certificates.
27+
28+
- [#5507](https://github.com/nodejs/node/pull/5507): _Fix a defect that makes
29+
the CacheBleed Attack possible_. Many, though not all, OpenSSL vulnerabilities
30+
in the TLS/SSL protocols also affect Node.js.
31+
32+
- [CVE-2016-2216](https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/):
33+
_Fix defects in HTTP header parsing for requests and responses that can allow
34+
response splitting_. This was a remotely-exploitable defect in the Node.js
35+
HTTP implementation.
36+
37+
When in doubt, please do send us a report.

0 commit comments

Comments
 (0)