Skip to content

Commit cdc4144

Browse files
committed
doc: provide info on impact of recent vulns
PR-URL: #1547 Reviewed-By: Matteo Collina <[email protected]> Reviewed-By: Yang Guo <[email protected]> Reviewed-By: Luigi Pinca <[email protected]> Reviewed-By: Mandeep Singh <[email protected]> Reviewed-By: Vladimir de Turckheim <[email protected]> Reviewed-By: Yang Guo <[email protected]> Reviewed-By: Tierney Cyren <[email protected]>
1 parent 85673cc commit cdc4144

File tree

3 files changed

+45
-2
lines changed

3 files changed

+45
-2
lines changed

build.js

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -270,7 +270,8 @@ function getSource (callback) {
270270
},
271271
banner: {
272272
visible: true,
273-
link: 'https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/'
273+
text: 'Spectre and Meltdown in the context of Node.js.',
274+
link: 'https://nodejs.org/en/blog/vulnerability/jan-2018-spectre-meltdown/'
274275
}
275276
}
276277
}

layouts/index.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414

1515
{{#if project.banner.visible}}
1616
<p class="home-version home-version-banner">
17-
<a href="{{ project.banner.link }}">{{{ labels.banner }}}</a>
17+
<a href="{{ project.banner.link }}">{{#if project.banner.text}}{{{ project.banner.text }}}{{else}}{{{ labels.banner }}}{{/if}}</a>
1818
</p>
1919
{{/if}}
2020

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
date: 2018-01-08T17:30:00.617Z
3+
category: vulnerability
4+
title: Meltdown and Spectre - Impact On Node.js
5+
slug: jan-2018-spectre-meltdown
6+
layout: blog-post.hbs
7+
author: Michael Dawson
8+
---
9+
10+
# Summary
11+
12+
Project zero has recently announced some new attacks that have received a
13+
lot of attention:
14+
https://googleprojectzero.blogspot.ca/2018/01/reading-privileged-memory-with-side.html.
15+
16+
The risk from these attacks to systems running Node.js resides in the
17+
systems in which your Node.js applications run, as opposed to the
18+
Node.js runtime itself. The trust model for Node.js assumes you are
19+
running trusted code and does not provide any separation between code
20+
running within the runtime itself. Therefore, untrusted code that
21+
would be necessary to execute these attacks in Node.js could already
22+
affect the execution of your Node.js applications in ways that
23+
are more severe than possible through these new attacks.
24+
25+
This does not mean that you don't need to protect yourself from
26+
these new attacks when running Node.js applications. If an attacker
27+
manages to run malicious code on an upatched OS (whether using
28+
JavaScript or something else) they may be able to access memory and or
29+
data that they should not have access to. In order to protect yourself
30+
from these cases, apply the security patches for your operating
31+
system. You do not need to update the Node.js runtime.
32+
33+
# Contact and future updates
34+
35+
The current Node.js security policy can be found at https://nodejs.org/en/security/.
36+
37+
Please contact [email protected] if you wish to report a vulnerability in Node.js.
38+
39+
Subscribe to the low-volume announcement-only nodejs-sec mailing list at
40+
https://groups.google.com/forum/#!forum/nodejs-sec to stay up to date
41+
on security vulnerabilities and security-related releases of Node.js and
42+
the projects maintained in the [nodejs GitHub organisation](https://github.com/nodejs/).

0 commit comments

Comments
 (0)