Skip to content

Commit adade26

Browse files
tniessenovflowd
andauthored
doc: fix typos in security release announcement (#5056)
Co-authored-by: Claudio Wunder <[email protected]>
1 parent 96525c8 commit adade26

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

locale/en/blog/vulnerability/february-2023-security-releases.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,11 @@ Impacts:
2121

2222
* All versions of the 19.x, 18.x, 16.x, and 14.x release lines.
2323

24-
## Node.js Permissions policies can be bypassed via process.mainModule (High) ([CVE-2023-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918))
24+
## Node.js Permissions policies can be bypassed via process.mainModule (High) ([CVE-2023-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918))
2525

26-
It was possible to bypass [Permissions](https://nodejs.org/api/permissions.html) and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.
26+
It was possible to bypass [Permissions](https://nodejs.org/api/permissions.html) and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with `--experimental-policy`.
2727

28-
Thank you, to [@goums](https://github.com/goums) for reporting this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
28+
Thank you, to [@goums](https://github.com/goums) for reporting this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
2929

3030
Impacts:
3131

@@ -35,7 +35,7 @@ Impacts:
3535

3636
In some cases Node.js did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.
3737

38-
"Thank you, to Morgan Jones and Ryan Dorrity from Viasat Secure Mobile for reporting and discovering this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
38+
Thank you, to Morgan Jones and Ryan Dorrity from Viasat Secure Mobile for reporting and discovering this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
3939

4040
Impacts:
4141

@@ -56,7 +56,7 @@ Impacts:
5656
## Regular Expression Denial of Service in Headers in Node.js fetch API(Low) ([CVE-2023-24807](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807))
5757

5858
The Headers.set() and Headers.append() methods in the
59-
[fetch API](https://nodejs.org/dist/latest/docs/api/globals.html#fetch) in Node.js where vulnerable to Regular a Expression Denial of Service (ReDoS) attacks.
59+
[fetch API](https://nodejs.org/dist/latest/docs/api/globals.html#fetch) in Node.js were vulnerable to a Regular Expression Denial of Service (ReDoS) attacks.
6060

6161
Thank you, to Carter Snook for reporting this vulnerability and thank you Rich Trott for fixing it.
6262

@@ -67,9 +67,9 @@ Impacts:
6767
## Node.js insecure loading of ICU data through ICU_DATA environment variable (Low) ([CVE-2023-23920](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920))
6868

6969
Node.js would search and potentially load ICU data when running with elevated priviledges. Node.js
70-
was modified to build with ICU_NO_USER_DATA_OVERRIDE to avoid this.
70+
was modified to build with `ICU_NO_USER_DATA_OVERRIDE` to avoid this.
7171

72-
Thank you, to Ben Noordhuis for reporting this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
72+
Thank you, to Ben Noordhuis for reporting this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
7373

7474
Impacts:
7575

0 commit comments

Comments
 (0)