Skip to content

2025-07-29, Version 24.5.0 (Current) #59257

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 96 commits into from
Jul 31, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
96 commits
Select commit Hold shift + click to select a range
d555db2
lib: flag to conditionally modify proto on deprecate
RafaelGSS Jul 8, 2025
f753645
net: update net.blocklist to allow file save and file management
alphaleadership Jul 8, 2025
1cffcc0
test: add missing port=0 arg in test-debugger-extract-function-name
dario-piotrowicz Jul 8, 2025
04c7514
meta: add marco-ippolito to security release stewards
marco-ippolito Jul 9, 2025
cfaa299
lib: fix incorrect `ArrayBufferPrototypeGetDetached` primordial type
dario-piotrowicz Jul 9, 2025
c9ded6b
doc: add sponsorship link to RafaelGSS
RafaelGSS Jul 9, 2025
515b581
module: throw error when re-runing errored module jobs
joyeecheung Jul 9, 2025
3a3eb68
repl: improve REPL disabling completion on proxies and getters
dario-piotrowicz Jul 9, 2025
2178007
src: check import attributes value types as strings
legendecas Jul 9, 2025
85d6a28
inspector: initial support for Network.loadNetworkResource
islandryu Jul 10, 2025
cb95e18
doc: add scroll margin to links
silverwind Jul 10, 2025
c52aaac
dns: support max timeout
theanarkh Jul 10, 2025
3924c43
doc: add missing `<code>` blocks
aduh95 Jul 10, 2025
45ffdb3
doc: add stability index to the `--watch-kill-signal` flag
dario-piotrowicz Jul 10, 2025
83cdf17
test_runner: clean up promisified interval generation
Renegade334 Jul 10, 2025
9d02960
doc: add missing environment variables to manpage
HumaneLogic Jul 11, 2025
467dbd3
repl: fix repl crashing on variable declarations without init
dario-piotrowicz Jul 11, 2025
623e264
tools: ignore CVE mention when linting release proposals
aduh95 Jul 13, 2025
d2e7f8e
doc: remove unused import in `zlib.md`
coderaiser Jul 14, 2025
6cb5e0d
doc: refine `util.parseArgs` `default` definition
Slayer95 Jul 15, 2025
1940a2c
doc: fix typed list formatting
avivkeller Jul 15, 2025
999b5e5
doc: run license-builder
github-actions[bot] Jul 16, 2025
2d1dcb8
doc: clarify ERR_FS_FILE_TOO_LARGE to reflect fs.readFile() I/O limit
haramj Jul 16, 2025
0e547e0
tools,test: enforce best practices to detect never settling promises
aduh95 Jul 16, 2025
9b2e965
doc: add RafaelGSS as steward July 25
RafaelGSS Jul 16, 2025
34c4900
doc: add missing section for `setReturnArrays` in `sqlite.md`
geeksilva97 Jul 17, 2025
e3e729c
build: remove suppressions.supp
RafaelGSS Jul 17, 2025
a9511a6
test: mark test-inspector-network-fetch as flaky on Windows
joyeecheung Jul 17, 2025
16dc53c
test: move http proxy tests to test/client-proxy
joyeecheung Jul 3, 2025
7f654ce
http,https: add built-in proxy support in http/https.request and Agent
joyeecheung Jul 1, 2025
324d9fc
meta: enable jsdoc/check-tag-names rule
anonrig Jul 18, 2025
135fca5
crypto: avoid copying buffers to UTF-8 strings in `crypto.hash()`
Renegade334 Jul 14, 2025
15e6c28
node-api,doc: update links to ecma262 with section names
legendecas Jul 18, 2025
9791ff3
worker: add web locks api
IlyasShabi May 29, 2025
b1a318d
doc: update release key for aduh95
aduh95 Jul 18, 2025
eeeb40e
crypto: add tls.setDefaultCACertificates()
joyeecheung Jul 18, 2025
71bb6cd
esm: js-string Wasm builtins in ESM Integration
guybedford Jul 10, 2025
1a44265
repl: handle errors from getters during completion
islandryu Jul 19, 2025
ef89c2f
src,test: fix config file parsing for flags defaulted to true
geeksilva97 Jul 20, 2025
8d869e6
fs: fix return value of fs APIs
theanarkh Jul 20, 2025
82d4175
test: update `startCLI` to set `--port=0` by default
dario-piotrowicz Jul 20, 2025
7fc3143
benchmark: reduce N for diagnostics_channel subscribe benchmark
artimmy Jul 20, 2025
88e434e
doc: add new environment variables doc page
dario-piotrowicz Jul 20, 2025
6f81b27
doc: fix typo in writing-test.md
SeokhunEom Jul 21, 2025
4ffa756
doc: avoid suggesting testing fast api with intense loop
legendecas Jul 21, 2025
83023e5
test: skip tests that cause timeouts on IBM i
abmusse Jul 21, 2025
d89390f
src: add cache to nearest parent package json
IlyasShabi Jul 21, 2025
f122602
deps: update corepack to 0.34.0
nodejs-github-bot Jul 22, 2025
fb52d0d
deps: upgrade openssl sources to openssl-3.0.17
nodejs-github-bot Jul 20, 2025
3f813ea
deps: update archs files for openssl-3.0.17
nodejs-github-bot Jul 20, 2025
15d8cc9
test: update WPT for WebCryptoAPI to 19d82c57ab
nodejs-github-bot Jul 20, 2025
c607004
test: update WPT for WebCryptoAPI to ab08796857
nodejs-github-bot Jul 21, 2025
51b8dfd
doc: add Aditi-1400 to collaborators
Aditi-1400 Jul 22, 2025
2a5f35b
deps: V8: cherry-pick 3d750c2aa9ef
targos Jun 18, 2025
f67b686
perf_hooks: do not expose SafeMap via Histogram wrapper
Renegade334 Jul 22, 2025
20be901
tools: bump @eslint/plugin-kit from 0.3.1 to 0.3.3 in /tools/eslint
dependabot[bot] Jul 22, 2025
72adf52
deps: update ada to 3.2.6
nodejs-github-bot Jul 22, 2025
88b99ee
src: remove declarations of removed BaseObject static fns
addaleax Jul 22, 2025
b919fe0
esm: unflag --experimental-wasm-modules
guybedford Feb 13, 2025
bfe4781
deps: update googletest to 7e17b15
nodejs-github-bot Jul 22, 2025
a34e445
deps: update sqlite to 3.50.3
nodejs-github-bot Jul 22, 2025
af789d9
deps: update undici to 7.12.0
nodejs-github-bot Jul 23, 2025
2b5d451
deps: update amaro to 1.1.1
nodejs-github-bot Jul 23, 2025
96c9dd7
meta: move one or more collaborators to emeritus
nodejs-github-bot Jul 23, 2025
7e0a0fc
test: expand linting rules around `assert` w literal messages
addaleax Jul 23, 2025
86babf9
src: use C++20 `consteval` for `FastStringKey`
addaleax Jul 21, 2025
77649ad
src: use `FastStringKey` for `TrackV8FastApiCall`
addaleax Jul 21, 2025
075d196
util: respect nested formats in styleText
himself65 Jul 23, 2025
dfb72d1
doc: add constraints for mem leak to threat model
RafaelGSS Jul 24, 2025
06cd746
doc: improve onboarding instructions
joyeecheung Jul 24, 2025
51f578a
tools: add support for URLs to PR commits in `merge.sh`
aduh95 Jul 24, 2025
d5640ca
cli: support `${pid}` placeholder in --cpu-prof-name
haramj Jul 24, 2025
3da5bc0
doc: fix broken sentence in `URL.parse`
SuperchupuDev Jul 24, 2025
ad6757e
benchmark: fix sqlite-is-transaction
RafaelGSS Jul 24, 2025
09717eb
benchmark: drop misc/punycode benchmark
RafaelGSS Jul 24, 2025
a28d804
benchmark: small lint fix on _cli.js
RafaelGSS Jul 24, 2025
28538f2
benchmark: add --track to benchmark
RafaelGSS Jul 25, 2025
a0d22e9
test: remove timeout in test-https-proxy-request-handshake-failure
joyeecheung Jul 25, 2025
195d603
tools: clarify README linter error message
joyeecheung Jul 25, 2025
55838e7
src: call unmask after install signal handler
theanarkh Jul 25, 2025
5457c7a
benchmark: adjust configuration for string-decoder bench
RafaelGSS Jul 25, 2025
3d2f919
process: make execve's args argument optional
mureinik Jul 26, 2025
9a8d202
doc: copyedit SECURITY.md
Trott Jul 26, 2025
1c3aadb
test: fix flaky test-worker-message-port-transfer-filehandle test
himself65 Jul 26, 2025
55a90ee
deps: upgrade npm to 11.5.1
npm-cli-bot Jul 26, 2025
fe0195f
module: fix conditions override in synchronous resolve hooks
joyeecheung Jul 26, 2025
f281272
buffer: cache Environment::GetCurrent to avoid repeated calls
mertcanaltin Jul 26, 2025
f5da494
cli: add --use-env-proxy
joyeecheung Jul 26, 2025
39978f5
test: prepare test-crypto-rsa-dsa for newer OpenSSL
richardlau May 1, 2025
dc66422
build,deps,tools: prepare to update to OpenSSL 3.5
richardlau Jul 25, 2025
ba8e95a
test: use mustSucceed in test-fs-read
mete0rfish Jul 27, 2025
1e99086
test: mark web lock held test as flaky
IlyasShabi Jul 27, 2025
927742b
doc: update the instruction on how to verify releases
aduh95 Jul 27, 2025
1f06ca9
deps: upgrade openssl sources to openssl-3.5.1
nodejs-github-bot Jul 27, 2025
998cef1
deps: update archs files for openssl-3.5.1
nodejs-github-bot Jul 27, 2025
931ec10
2025-07-31, Version 24.5.0 (Current)
aduh95 Jul 29, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
The diff you're trying to view is too large. We only load the first 3000 changed files.
2 changes: 1 addition & 1 deletion .github/workflows/lint-release-proposal.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ jobs:
EXPECTED_TRAILER="^$GITHUB_SERVER_URL/$GITHUB_REPOSITORY/pull/[[:digit:]]+\$"
echo "Expected trailer format: $EXPECTED_TRAILER"
PR_URL="$(git --no-pager log -1 --format='%(trailers:key=PR-URL,valueonly)')"
echo "Actual: $ACTUAL"
echo "Actual: $PR_URL"
echo "$PR_URL" | grep -E -q "$EXPECTED_TRAILER"

PR_HEAD="$(gh pr view "$PR_URL" --json headRefOid -q .headRefOid)"
Expand Down
3 changes: 2 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,8 @@ release.
</tr>
<tr>
<td valign="top">
<b><a href="doc/changelogs/CHANGELOG_V24.md#24.4.1">24.4.1</a></b><br/>
<b><a href="doc/changelogs/CHANGELOG_V24.md#24.5.0">24.5.0</a></b><br/>
<a href="doc/changelogs/CHANGELOG_V24.md#24.4.1">24.4.1</a><br/>
<a href="doc/changelogs/CHANGELOG_V24.md#24.4.0">24.4.0</a><br/>
<a href="doc/changelogs/CHANGELOG_V24.md#24.3.0">24.3.0</a><br/>
<a href="doc/changelogs/CHANGELOG_V24.md#24.2.0">24.2.0</a><br/>
Expand Down
2 changes: 1 addition & 1 deletion LICENSE
Original file line number Diff line number Diff line change
Expand Up @@ -2100,7 +2100,7 @@ The externally maintained libraries used by Node.js are:

- inspector_protocol, located at deps/inspector_protocol, is licensed as follows:
"""
// Copyright 2016 The Chromium Authors. All rights reserved.
// Copyright 2016 The Chromium Authors.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are
Expand Down
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -1641,7 +1641,7 @@ HAS_DOCKER ?= $(shell command -v docker > /dev/null 2>&1; [ $$? -eq 0 ] && echo

.PHONY: gen-openssl
ifeq ($(HAS_DOCKER), 1)
DOCKER_COMMAND ?= docker run -it -v $(PWD):/node
DOCKER_COMMAND ?= docker run --rm -u $(shell id -u) -v $(PWD):/node
IS_IN_WORKTREE = $(shell grep '^gitdir: ' $(PWD)/.git 2>/dev/null)
GIT_WORKTREE_COMMON = $(shell git rev-parse --git-common-dir)
DOCKER_COMMAND += $(if $(IS_IN_WORKTREE), -v $(GIT_WORKTREE_COMMON):$(GIT_WORKTREE_COMMON))
Expand Down
59 changes: 31 additions & 28 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -95,37 +95,27 @@ _docs_ subdirectory. Version-specific documentation is also at

### Verifying binaries

Download directories contain a `SHASUMS256.txt` file with SHA checksums for the
files.
Download directories contain a `SHASUMS256.txt.asc` file with SHA checksums for the
files and the releaser PGP signature.

To download `SHASUMS256.txt` using `curl`:
You can get a trusted keyring from nodejs/release-keys, e.g. using `curl`:

```bash
curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt
curl -fsLo "/path/to/nodejs-keyring.kbx" "https://github.com/nodejs/release-keys/raw/HEAD/gpg/pubring.kbx"
```

To check that downloaded files match the checksum, use `sha256sum`:
Alternatively, you can import the releaser keys in your default keyring, see
[Release keys](#release-keys) for commands to how to do that.

```bash
sha256sum -c SHASUMS256.txt --ignore-missing
```

For Current and LTS, the GPG detached signature of `SHASUMS256.txt` is in
`SHASUMS256.txt.sig`. You can use it with `gpg` to verify the integrity of
`SHASUMS256.txt`. You will first need to import
[the GPG keys of individuals authorized to create releases](#release-keys).

See [Release keys](#release-keys) for commands to import active release keys.

Next, download the `SHASUMS256.txt.sig` for the release:
Then, you can verify the files you've downloaded locally
(if you're using your default keyring, pass `--keyring="${GNUPGHOME:-~/.gnupg}/pubring.kbx"`):

```bash
curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt.sig
curl -fsO "https://nodejs.org/dist/${VERSION}/SHASUMS256.txt.asc" \
&& gpgv --keyring="/path/to/nodejs-keyring.kbx" --output SHASUMS256.txt < SHASUMS256.txt.asc \
&& shasum --check SHASUMS256.txt --ignore-missing
```

Then use `gpg --verify SHASUMS256.txt.sig SHASUMS256.txt` to verify
the file's signature.

## Building Node.js

See [BUILDING.md](BUILDING.md) for instructions on how to build Node.js from
Expand Down Expand Up @@ -289,6 +279,8 @@ For information about the governance of the Node.js project, see
**Abdirahim Musse** <<[email protected]>>
* [addaleax](https://github.com/addaleax) -
**Anna Henningsen** <<[email protected]>> (she/her)
* [Aditi-1400](https://github.com/Aditi-1400) -
**Aditi Singh** <<[email protected]>> (she/her)
* [aduh95](https://github.com/aduh95) -
**Antoine du Hamel** <<[email protected]>> (he/him) - [Support me](https://github.com/sponsors/aduh95)
* [anonrig](https://github.com/anonrig) -
Expand Down Expand Up @@ -383,8 +375,6 @@ For information about the governance of the Node.js project, see
**Chengzhong Wu** <<[email protected]>> (he/him)
* [lemire](https://github.com/lemire) -
**Daniel Lemire** <<[email protected]>>
* [Linkgoron](https://github.com/Linkgoron) -
**Nitzan Uziely** <<[email protected]>>
* [LiviaMedeiros](https://github.com/LiviaMedeiros) -
**LiviaMedeiros** <<[email protected]>>
* [ljharb](https://github.com/ljharb) -
Expand Down Expand Up @@ -424,7 +414,7 @@ For information about the governance of the Node.js project, see
* [Qard](https://github.com/Qard) -
**Stephen Belanger** <<[email protected]>> (he/him)
* [RafaelGSS](https://github.com/RafaelGSS) -
**Rafael Gonzaga** <<[email protected]>> (he/him)
**Rafael Gonzaga** <<[email protected]>> (he/him) - [Support me](https://github.com/sponsors/RafaelGSS)
* [RaisinTen](https://github.com/RaisinTen) -
**Darshan Sen** <<[email protected]>> (he/him) - [Support me](https://github.com/sponsors/RaisinTen)
* [richardlau](https://github.com/richardlau) -
Expand Down Expand Up @@ -597,6 +587,8 @@ For information about the governance of the Node.js project, see
**Lance Ball** <<[email protected]>> (he/him)
* [Leko](https://github.com/Leko) -
**Shingo Inoue** <<[email protected]>> (he/him)
* [Linkgoron](https://github.com/Linkgoron) -
**Nitzan Uziely** <<[email protected]>>
* [lucamaraschi](https://github.com/lucamaraschi) -
**Luca Maraschi** <<[email protected]>> (he/him)
* [lundibundi](https://github.com/lundibundi) -
Expand Down Expand Up @@ -790,7 +782,7 @@ responding to new issues.
Primary GPG keys for Node.js Releasers (some Releasers sign with subkeys):

* **Antoine du Hamel** <<[email protected]>>
`C0D6248439F1D5604AAFFB4021D900FFDB233756`
`5BE8A3F6C8A5C01D106C0AD820B1A390B168D356`
* **Juan José Arboleda** <<[email protected]>>
`DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7`
* **Marco Ippolito** <<[email protected]>>
Expand All @@ -806,11 +798,14 @@ Primary GPG keys for Node.js Releasers (some Releasers sign with subkeys):
* **Ulises Gascón** <<[email protected]>>
`A363A499291CBBC940DD62E41F10027AF002F8B0`

To import the full set of trusted release keys (including subkeys possibly used
to sign releases):
You can use the keyring the project maintains at
<https://github.com/nodejs/release-keys/raw/refs/heads/main/gpg-only-active-keys/pubring.kbx>.
Alternatively, you can import them from a public key server. Have in mind that
the project cannot guarantee the availability of the server nor the keys on
that server.

```bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys C0D6248439F1D5604AAFFB4021D900FFDB233756 # Antoine du Hamel
gpg --keyserver hkps://keys.openpgp.org --recv-keys 5BE8A3F6C8A5C01D106C0AD820B1A390B168D356 # Antoine du Hamel
gpg --keyserver hkps://keys.openpgp.org --recv-keys DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7 # Juan José Arboleda
gpg --keyserver hkps://keys.openpgp.org --recv-keys CC68F5A3106FF448322E48ED27F5E38D5B0A215F # Marco Ippolito
gpg --keyserver hkps://keys.openpgp.org --recv-keys 8FCCA13FEF1D0C2E91008E09770F7A9A5AE15600 # Michaël Zasso
Expand All @@ -827,6 +822,8 @@ verify a downloaded file.

<summary>Other keys used to sign some previous releases</summary>

* **Antoine du Hamel** <<[email protected]>>
`C0D6248439F1D5604AAFFB4021D900FFDB233756`
* **Beth Griggs** <<[email protected]>>
`4ED778F539E3634C779C87C6D7062848A1AB005C`
* **Bryan English** <<[email protected]>>
Expand Down Expand Up @@ -865,6 +862,9 @@ verify a downloaded file.
* **Timothy J Fontaine** <<[email protected]>>
`7937DFD2AB06298B2293C3187D33FF9D0246406D`

The project maintains a keyring able to verify all past releases of Node.js at
<https://github.com/nodejs/release-keys/raw/refs/heads/main/gpg/pubring.kbx>.

</details>

### Security release stewards
Expand All @@ -880,6 +880,9 @@ releases on a rotation basis as outlined in the
* [Datadog](https://www.datadoghq.com/)
* [bengl](https://github.com/bengl) -
**Bryan English** <<[email protected]>> (he/him)
* [HeroDevs](https://www.herodevs.com/)
* [marco-ippolito](https://github.com/marco-ippolito) -
**Marco Ippolito** <<[email protected]>> (he/him)
* [NodeSource](https://nodesource.com/)
* [juanarbol](https://github.com/juanarbol) -
**Juan José Arboleda** <<[email protected]>> (he/him)
Expand Down
38 changes: 27 additions & 11 deletions SECURITY.md
Original file line number Diff line number Diff line change
Expand Up @@ -109,6 +109,22 @@ does not trust is considered a vulnerability:
the correct use of Node.js APIs.
* The unavailability of the runtime, including the unbounded degradation of its
performance.
* Memory leaks qualify as vulnerabilities when all of the following criteria are met:
* The API is being correctly used.
* The API doesn't have a warning against its usage in a production environment.
* The API is public and documented.
* The API is on stable (2.0) status.
* The memory leak is significant enough to cause a denial of service quickly
or in a context not controlled by the user (for example, HTTP parsing).
* The memory leak is directly exploitable by an untrusted source without requiring application mistakes.
* The leak cannot be reasonably mitigated through standard operational practices (like process recycling).
* The leak occurs deterministically under normal usage patterns rather than edge cases.
* The leak occurs at a rate that would cause practical resource exhaustion within a practical timeframe under
typical workloads.
* The attack demonstrates [asymmetric resource consumption](https://cwe.mitre.org/data/definitions/405.html),
where the attacker expends significantly fewer resources than what's required by the server to process the
attack. Attacks requiring comparable resources on the attacker's side (which can be mitigated through common
practices like rate limiting) may not qualify.

If Node.js loads configuration files or runs code by default (without a
specific request from the user), and this is not documented, it is considered a
Expand All @@ -125,7 +141,7 @@ Vulnerabilities related to this case may be fixed by a documentation update.
* The data received from the remote end of outbound network connections
that are created through the use of Node.js APIs and
which is transformed/validated by Node.js before being passed
to the application EXCEPT with respect to payload length. Node.js trusts
to the application **except** with respect to payload length. Node.js trusts
that applications make connections/requests which will avoid payload
sizes that will result in a Denial of Service.
* HTTP APIs (all flavors) client APIs.
Expand All @@ -146,9 +162,9 @@ then untrusted input must not lead to arbitrary JavaScript code execution.

**Node.js trusts everything else**. Examples include:

* The developers and infrastructure that runs it.
* The developers and infrastructure that run it.
* The operating system that Node.js is running under and its configuration,
along with anything under control of the operating system.
along with anything under the control of the operating system.
* The code it is asked to run, including JavaScript, WASM and native code, even
if said code is dynamically loaded, e.g., all dependencies installed from the
npm registry.
Expand Down Expand Up @@ -184,12 +200,12 @@ the community they pose.

* Node.js provides APIs to validate handling of Subject Alternative Names (SANs)
in certificates used to connect to a TLS/SSL endpoint. If certificates can be
crafted which result in incorrect validation by the Node.js APIs that is
crafted that result in incorrect validation by the Node.js APIs that is
considered a vulnerability.

#### Inconsistent Interpretation of HTTP Requests (CWE-444)

* Node.js provides APIs to accept http connections. Those APIs parse the
* Node.js provides APIs to accept HTTP connections. Those APIs parse the
headers received for a connection and pass them on to the application.
Bugs in parsing those headers which can result in request smuggling are
considered vulnerabilities.
Expand All @@ -202,9 +218,9 @@ the community they pose.

#### External Control of System or Configuration Setting (CWE-15)

* If Node.js automatically loads a configuration file which is not documented
* If Node.js automatically loads a configuration file that is not documented
and modification of that configuration can affect the confidentiality of
data protected using the Node.js APIs this is considered a vulnerability.
data protected using the Node.js APIs, then this is considered a vulnerability.

### Examples of non-vulnerabilities

Expand All @@ -227,7 +243,7 @@ the community they pose.

#### External Control of System or Configuration Setting (CWE-15)

* If Node.js automatically loads a configuration file which is documented
* If Node.js automatically loads a configuration file that is documented,
no scenario that requires modification of that configuration file is
considered a vulnerability.

Expand All @@ -247,9 +263,9 @@ the community they pose.

## Assessing experimental features reports

Experimental features are eligible to reports as any other stable feature of
Node.js. They will also be susceptible to receiving the same severity score
as any other stable feature.
Experimental features are eligible for security reports just like any other
stable feature of Node.js. They may also receive the same severity score that a
stable feature would.

## Receiving security updates

Expand Down
4 changes: 2 additions & 2 deletions benchmark/_cli.js
Original file line number Diff line number Diff line change
Expand Up @@ -140,8 +140,8 @@ CLI.prototype.getCpuCoreSetting = function() {
const isValid = /^(\d+(-\d+)?)(,\d+(-\d+)?)*$/.test(value);
if (!isValid) {
throw new Error(`
Invalid CPUSET format: "${value}". Please use a single core number (e.g., "0"),
a range of cores (e.g., "0-3"), or a list of cores/ranges
Invalid CPUSET format: "${value}". Please use a single core number (e.g., "0"),
a range of cores (e.g., "0-3"), or a list of cores/ranges
(e.g., "0,2,4" or "0-2,4").\n\n${this.usage}
`);
}
Expand Down
2 changes: 1 addition & 1 deletion benchmark/common.js
Original file line number Diff line number Diff line change
Expand Up @@ -386,7 +386,7 @@ function getUrlData(withBase) {
* @param {number} e The repetition of the data, as exponent of 2
* @param {boolean} withBase Whether to include a base URL
* @param {boolean} asUrl Whether to return the results as URL objects
* @return {string[] | string[][] | URL[]}
* @returns {string[] | string[][] | URL[]}
*/
function bakeUrlData(type, e = 0, withBase = false, asUrl = false) {
let result = [];
Expand Down
7 changes: 3 additions & 4 deletions benchmark/diagnostics_channel/subscribe.js
Original file line number Diff line number Diff line change
Expand Up @@ -3,17 +3,16 @@ const common = require('../common.js');
const dc = require('diagnostics_channel');

const bench = common.createBenchmark(main, {
n: [1e8],
n: [1e5],
});

function noop() {}
function noop() { }

function main({ n }) {
const channel = dc.channel('channel.0');

bench.start();
for (let i = 0; i < n; i++) {
channel.subscribe(noop);
dc.subscribe('channel.0', noop);
}
bench.end(n);
}
79 changes: 0 additions & 79 deletions benchmark/misc/punycode.js

This file was deleted.

Loading
Loading