Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

blog: add pos release announcement #5993

Merged
merged 3 commits into from
Oct 13, 2023
Merged

blog: add pos release announcement #5993

merged 3 commits into from
Oct 13, 2023

Conversation

RafaelGSS
Copy link
Member

No description provided.

@RafaelGSS RafaelGSS requested review from a team as code owners October 13, 2023 21:14
@vercel
Copy link

vercel bot commented Oct 13, 2023

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
nodejs-org ✅ Ready (Inspect) Visit Preview 💬 Add feedback Oct 13, 2023 9:15pm

* \[[`a4cb7fc7c0`](https://github.com/nodejs/node/commit/a4cb7fc7c0)] - **policy**: use tamper-proof integrity check function (Tobias Nießen) [nodejs-private/node-private#462](https://github.com/nodejs-private/node-private/pull/462)

Windows 32-bit Installer: https://nodejs.org/dist/v20.8.1/node-v20.8.1-x86.msi \
Windows 64-bit Installer: *Coming soon* \
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it expected? @richardlau

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No. 😕

Suggested change
Windows 64-bit Installer: *Coming soon* \
Windows 64-bit Installer: https://nodejs.org/dist/v20.8.1/node-v20.8.1-x64.msi \

@github-actions
Copy link

Unit Test Coverage Report

Lines Statements Branches Functions
Coverage: 95%
94.68% (267/282) 78.12% (50/64) 92.98% (53/57)

Unit Test Report

Tests Skipped Failures Errors Time
27 0 💤 0 ❌ 0 🔥 5.572s ⏱️

@RafaelGSS RafaelGSS merged commit ce46d3c into main Oct 13, 2023
11 of 14 checks passed
@RafaelGSS RafaelGSS deleted the pos-release-announcement branch October 13, 2023 21:20
Copy link
Member

@tniessen tniessen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: typo pos in commit message


* [CVE-2023-44487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487): `nghttp2` Security Release (High)
* [CVE-2023-45143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45143): `undici` Security Release (High)
* [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity checks according to policies can be circumvented (Medium)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity checks according to policies can be circumvented (Medium)
* [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity checks according to policies can be circumvented (Medium)

* [CVE-2023-45143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45143): `undici` Security Release (High)
* [CVE-2023-39332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39332): Path traversal through path stored in Uint8Array (High)
* [CVE-2023-39331](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39331): Permission model improperly protects against path traversal (High)
* [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity checks according to policies can be circumvented (Medium)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity checks according to policies can be circumvented (Medium)
* [CVE-2023-38552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552): Integrity checks according to policies can be circumvented (Medium)


## nghttp2 - HTTP/2 Rapid Reset (High) - (CVE-2023-44487)

Rapidly creating and cancelling streams (HEADERS frame immediately followed by RST_STREAM) without bound cause denial of service.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Rapidly creating and cancelling streams (HEADERS frame immediately followed by RST_STREAM) without bound cause denial of service.
Rapidly creating and cancelling streams (`HEADERS` frame immediately followed by `RST_STREAM`) without bound causes denial of service.


Impacts:

* This vulnerability affects all users of HTTP2 servers in all active
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* This vulnerability affects all users of HTTP2 servers in all active
* This vulnerability affects all users of HTTP/2 servers in all active

Comment on lines +81 to +82


Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change

Comment on lines +108 to +109
- 1 medium severity issues.
- 1 low severity issues.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- 1 medium severity issues.
- 1 low severity issues.
- 1 medium severity issue.
- 1 low severity issue.

@@ -32,6 +124,6 @@ Releases will be available on, or shortly after, Friday October 13 2023.

## Contact and future updates

The current Node.js security policy can be found at <https://nodejs.org/en/security/>. Please follow the process outlined in <https://github.com/nodejs/node/blob/main/SECURITY.md> if you wish to report a vulnerability in Node.js.
The current Node.js security policy can be found at <https://nodejs.org/en/security/>. Please follow the process outlined in <https://github.com/nodejs/node/blob/master/SECURITY.md> if you wish to report a vulnerability in Node.js.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The current Node.js security policy can be found at <https://nodejs.org/en/security/>. Please follow the process outlined in <https://github.com/nodejs/node/blob/master/SECURITY.md> if you wish to report a vulnerability in Node.js.
The current Node.js security policy can be found at <https://nodejs.org/en/security/>. Please follow the process outlined in <https://github.com/nodejs/node/blob/main/SECURITY.md> if you wish to report a vulnerability in Node.js.

@ovflowd
Copy link
Member

ovflowd commented Oct 13, 2023

@RafaelGSS did you wait for CI? I don't see that this PR got any approval, nor the CI did pass. Please avoid direct merges when possible 🙇

@MattIPv4
Copy link
Member

@tniessen or @RafaelGSS would you be able to fast-follow with those suggested changes in a new PR?

@RafaelGSS
Copy link
Member Author

I didn't wait for CI, sorry. The release is out and we should have this post asap. I'll create a PR with the suggested changes.

@tniessen
Copy link
Member

@MattIPv4 I'll open a separate PR. @RafaelGSS probably still has work to do due to the security releases, which take priority :)

@ovflowd
Copy link
Member

ovflowd commented Oct 13, 2023

I didn't wait for CI, sorry. The release is out and we should have this post asap. I'll create a PR with the suggested changes.

Right, the CI takes usually just around 50s-1 minute and half, we just want to ensure that the build passes and works as expected :) (I don't think one extra minute would hurt 🙇)

@ovflowd
Copy link
Member

ovflowd commented Oct 13, 2023

Well, main is broken now.

@RafaelGSS
Copy link
Member Author

Working on that.

@tniessen
Copy link
Member

Linter errors should be fixed #5994.

On a side note, I think the Markdown rules in this repo differ from the Markdown rules in the core repo, but we use some of the same content for both reps.

@ovflowd
Copy link
Member

ovflowd commented Oct 13, 2023

On a side note, I think the Markdown rules in this repo differ from the Markdown rules in the core repo, but we use some of the same content for both reps.

Are you referring to the * instead of -? We don't use the remark-preset-lint-node as it is incompatible with MDX and causes serious issues.

But we can change the rules to use * instead of - as it is on Node core. Besides of that, I would always recommend to:

  1. Run your changes locally
  2. Ensure you have the Git Hooks installed (simply do npm i
  3. Ensure it builds locally
  4. Commit (linting is done automatically)
  5. CI on a PR.

@tniessen
Copy link
Member

Are you referring to the * instead of -?

That's the main difference that I noticed so far :)

@ovflowd
Copy link
Member

ovflowd commented Oct 13, 2023

Are you referring to the * instead of -?

That's the main difference that I noticed so far :)

Apparently prettier enforces -, there's nothing I can do here, at least I can try to make the ride smoother... #5997

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants