|
| 1 | +--- |
| 2 | +date: 2018-01-08T17:30:00.617Z |
| 3 | +category: vulnerability |
| 4 | +title: Meltdown and Spectre - Impact On Node.js |
| 5 | +slug: jan-2018-spectre-meltdown |
| 6 | +layout: blog-post.hbs |
| 7 | +author: Michael Dawson |
| 8 | +--- |
| 9 | + |
| 10 | +# Summary |
| 11 | + |
| 12 | +Project zero has recently announced some new attacks that have received a |
| 13 | +lot of attention: |
| 14 | +https://googleprojectzero.blogspot.ca/2018/01/reading-privileged-memory-with-side.html. |
| 15 | + |
| 16 | +The risk from these attacks to systems running Node.js resides in the |
| 17 | +systems in which your Node.js applications run, as opposed to the |
| 18 | +Node.js runtime itself. The trust model for Node.js assumes you are |
| 19 | +running trusted code and does not provide any separation between code |
| 20 | +running within the runtime itself. Therefore, untrusted code that |
| 21 | +would be necessary to execute these attacks in Node.js could already |
| 22 | +affect the execution of your Node.js applications in ways that |
| 23 | +are more severe than possible through these new attacks. |
| 24 | + |
| 25 | +This does not mean that you don't need to protect yourself from |
| 26 | +these new attacks when running Node.js applications. If an attacker |
| 27 | +manages to run malicious code on an upatched OS (whether using |
| 28 | +JavaScript or something else) they may be able to access memory and or |
| 29 | +data that they should not have access to. In order to protect yourself |
| 30 | +from these cases, apply the security patches for your operating |
| 31 | +system. You do not need to update the Node.js runtime. |
| 32 | + |
| 33 | +# Contact and future updates |
| 34 | + |
| 35 | +The current Node.js security policy can be found at https://nodejs.org/en/security/. |
| 36 | + |
| 37 | +Please contact [email protected] if you wish to report a vulnerability in Node.js. |
| 38 | + |
| 39 | +Subscribe to the low-volume announcement-only nodejs-sec mailing list at |
| 40 | +https://groups.google.com/forum/#!forum/nodejs-sec to stay up to date |
| 41 | +on security vulnerabilities and security-related releases of Node.js and |
| 42 | +the projects maintained in the [nodejs GitHub organisation](https://github.com/nodejs/). |
0 commit comments