summaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorwarnerp18 <warnerp18@gmail.com>2018-11-01 21:24:54 -0700
committerRich Trott <rtrott@gmail.com>2018-11-04 00:08:18 -0700
commit472a3d890bcd1c6799658d72bb813626a16d0adc (patch)
tree6feaf8d359d524cf26bf0c7c2cafbf140494c808 /README.md
parentf581aced91dda4f19d31c8f39ecb9272eec92c4f (diff)
downloadandroid-node-v8-472a3d890bcd1c6799658d72bb813626a16d0adc.tar.gz
android-node-v8-472a3d890bcd1c6799658d72bb813626a16d0adc.tar.bz2
android-node-v8-472a3d890bcd1c6799658d72bb813626a16d0adc.zip
doc: add SECURITY.md to readme.md
This adds a SECURITY.md file and links to the security document per the request of @https://github.com/Trott at a recent SF Node meetup. PR-URL: https://github.com/nodejs/node/pull/24031 Reviewed-By: Rich Trott <rtrott@gmail.com> Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com> Reviewed-By: Refael Ackermann <refack@gmail.com> Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
Diffstat (limited to 'README.md')
-rw-r--r--README.md39
1 files changed, 2 insertions, 37 deletions
diff --git a/README.md b/README.md
index 671e532145..a4a93612c1 100644
--- a/README.md
+++ b/README.md
@@ -159,43 +159,8 @@ source and a list of supported platforms.
## Security
-If you find a security vulnerability in Node.js, please report it to
-security@nodejs.org. Please withhold public disclosure until after the security
-team has addressed the vulnerability.
-
-The security team will acknowledge your email within 24 hours. You will receive
-a more detailed response within 48 hours.
-
-There are no hard and fast rules to determine if a bug is worth reporting as a
-security issue. Here are some examples of past issues and what the Security
-Response Team thinks of them. When in doubt, please do send us a report
-nonetheless.
-
-
-### Public disclosure preferred
-
-- [#14519](https://github.com/nodejs/node/issues/14519): _Internal domain
- function can be used to cause segfaults_. Requires the ability to execute
- arbitrary JavaScript code. That is already the highest level of privilege
- possible.
-
-### Private disclosure preferred
-
-- [CVE-2016-7099](https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/):
- _Fix invalid wildcard certificate validation check_. This was a high-severity
- defect. It caused Node.js TLS clients to accept invalid wildcard certificates.
-
-- [#5507](https://github.com/nodejs/node/pull/5507): _Fix a defect that makes
- the CacheBleed Attack possible_. Many, though not all, OpenSSL vulnerabilities
- in the TLS/SSL protocols also affect Node.js.
-
-- [CVE-2016-2216](https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/):
- _Fix defects in HTTP header parsing for requests and responses that can allow
- response splitting_. This was a remotely-exploitable defect in the Node.js
- HTTP implementation.
-
-When in doubt, please do send us a report.
-
+For information on reporting security vulnerabilities in Node.js, see
+[SECURITY.md](./SECURITY.md).
## Current Project Team Members