Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

doc: provide info on impact of recent vulns #1547

Closed
wants to merge 6 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion build.js
Original file line number Diff line number Diff line change
Expand Up @@ -270,7 +270,8 @@ function getSource (callback) {
},
banner: {
visible: true,
link: 'https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/'
text: 'Spectre and Meltdown in the context of Node.js.',
link: 'https://nodejs.org/en/blog/vulnerability/jan-2018-spectre-meltdown/'
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion layouts/index.hbs
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@

{{#if project.banner.visible}}
<p class="home-version home-version-banner">
<a href="{{ project.banner.link }}">{{{ labels.banner }}}</a>
<a href="{{ project.banner.link }}">{{#if project.banner.text}}{{{ project.banner.text }}}{{else}}{{{ labels.banner }}}{{/if}}</a>
</p>
{{/if}}

Expand Down
42 changes: 42 additions & 0 deletions locale/en/blog/vulnerability/jan-2018-spectre-meltdown.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
---
date: 2018-01-08T17:30:00.617Z
category: vulnerability
title: Meltdown and Spectre - Impact On Node.js
slug: jan-2018-spectre-meltdown
layout: blog-post.hbs
author: Michael Dawson
---

# Summary

Project zero has recently announced some new attacks that have received a
lot of attention:
https://googleprojectzero.blogspot.ca/2018/01/reading-privileged-memory-with-side.html.

The risk from these attacks to systems running Node.js resides in the
systems in which your Node.js applications run, as opposed to the
Node.js runtime itself. The trust model for Node.js assumes you are
running trusted code and does not provide any separation between code
running within the runtime itself. Therefore, untrusted code that
would be necessary to execute these attacks in Node.js could already
affect the execution of your Node.js applications in ways that
are more severe than possible through these new attacks.

This does not mean that you don't need to protect yourself from
these new attacks when running Node.js applications. If an attacker
manages to run malicious code on an upatched OS (whether using
JavaScript or something else) they may be able to access memory and or
data that they should not have access to. In order to protect yourself
from these cases, apply the security patches for your operating
system. You do not need to update the Node.js runtime.

# Contact and future updates

The current Node.js security policy can be found at https://nodejs.org/en/security/.

Please contact [email protected] if you wish to report a vulnerability in Node.js.

Subscribe to the low-volume announcement-only nodejs-sec mailing list at
https://groups.google.com/forum/#!forum/nodejs-sec to stay up to date
on security vulnerabilities and security-related releases of Node.js and
the projects maintained in the [nodejs GitHub organisation](https://github.com/nodejs/).