Skip to content

Commit 0d4de59

Browse files
Trottrvagg
authored andcommitted
doc: simplify valid security issue descriptions
PR-URL: #23881 Reviewed-By: James M Snell <[email protected]> Reviewed-By: Luigi Pinca <[email protected]>
1 parent d0368b8 commit 0d4de59

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

README.md

+4-5
Original file line numberDiff line numberDiff line change
@@ -202,18 +202,17 @@ us a report nonetheless.
202202
### Private disclosure preferred
203203

204204
- [CVE-2016-7099](https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/):
205-
_Fix invalid wildcard certificate validation check_. This is a high severity
206-
defect that would allow a malicious TLS server to serve an invalid wildcard
207-
certificate for its hostname and be improperly validated by a Node.js client.
205+
_Fix invalid wildcard certificate validation check_. This was a high-severity
206+
defect. It caused Node.js TLS clients to accept invalid wildcard certificates.
208207

209208
- [#5507](https://github.com/nodejs/node/pull/5507): _Fix a defect that makes
210209
the CacheBleed Attack possible_. Many, though not all, OpenSSL vulnerabilities
211210
in the TLS/SSL protocols also effect Node.js.
212211

213212
- [CVE-2016-2216](https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/):
214213
_Fix defects in HTTP header parsing for requests and responses that can allow
215-
response splitting_. While the impact of this vulnerability is application and
216-
network dependent, it is remotely exploitable in the HTTP protocol.
214+
response splitting_. This was a remotely-exploitable defect in the Node.js
215+
HTTP implementation.
217216

218217
When in doubt, please do send us a report.
219218

0 commit comments

Comments
 (0)