doc: describe what security issues are · nodejs/node@33fdbb5
@@ -172,6 +172,51 @@ Your email will be acknowledged within 24 hours, and you’ll receive a more
172172detailed response to your email within 48 hours indicating the next steps in
173173handling your report.
174174175+There are no hard and fast rules to determine if a bug is worth reporting as
176+a security issue. The general rule is any issue worth reporting
177+must allow an attacker to compromise the confidentiality, integrity
178+or availability of the Node.js application or its system for which the attacker
179+does not already have the capability.
180+181+To illustrate the point, here are some examples of past issues and what the
182+Security Reponse Team thinks of them. When in doubt, however, please do send
183+us a report nonetheless.
184+185+186+### Public disclosure preferred
187+188+- [#14519](https://github.com/nodejs/node/issues/14519): _Internal domain
189+ function can be used to cause segfaults_. Causing program termination using
190+ either the public Javascript APIs or the private bindings layer APIs requires
191+ the ability to execute arbitrary Javascript code, which is already the highest
192+ level of privilege possible.
193+194+- [#12141](https://github.com/nodejs/node/pull/12141): _buffer: zero fill
195+ Buffer(num) by default_. The buffer constructor behaviour was documented,
196+ but found to be prone to [mis-use](https://snyk.io/blog/exploiting-buffer/).
197+ It has since been changed, but despite much debate, was not considered misuse
198+ prone enough to justify fixing in older release lines and breaking our
199+ API stability contract.
200+201+### Private disclosure preferred
202+203+- [CVE-2016-7099](https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/):
204+_Fix invalid wildcard certificate validation check_. This is a high severity
205+ defect that would allow a malicious TLS server to serve an invalid wildcard
206+ certificate for its hostname and be improperly validated by a Node.js client.
207+208+- [#5507](https://github.com/nodejs/node/pull/5507): _Fix a defect that makes
209+ the CacheBleed Attack possible_. Many, though not all, OpenSSL vulnerabilities
210+ in the TLS/SSL protocols also effect Node.js.
211+212+- [CVE-2016-2216](https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/):
213+_Fix defects in HTTP header parsing for requests and responses that can allow
214+ response splitting_. While the impact of this vulnerability is application and
215+ network dependent, it is remotely exploitable in the HTTP protocol.
216+217+When in doubt, please do send us a report.
218+219+175220## Current Project Team Members
176221177222The Node.js project team comprises a group of core collaborators and a sub-group