Open RafaelGSS opened 3 days ago
@RafaelGSS as you mentioned if they pin they won't get a warning.
If instead we published as CVE indicating the release was EOL they would get if they are running CVE scans. I suspect this would be a more reliable way of having it be recognized as a risk.
I think we could do both, issue a single CVE alerting EOL (after a sec release) and create a patch release with a warning?
I think doing both makes sense to me, provide we have a volunteer to do the patch release (as I think that's more work that doing the CVE).
I was talking with @marco-ippolito and we were discussing having ways for people to know when they are using an insecure version of Node.js. Instead of having a flag (https://github.com/nodejs/security-wg/issues/852), what if we release a patch version after one or two months of EOL alerting users they are using an EOL version?
I mean, if they pin the version and don't get the last release, they won't see the warning, but I assume it will affect most users. We could try to do it to non-LTS versions first, and then we expand the coverage to all EOL versions (starting this year, of course).
cc: @nodejs/security-wg @nodejs/tsc