From 0722b0d1dbe6a21b4dbe36b1fbd4c71bad0b7859 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Sun, 19 Apr 2020 17:51:02 -0400 Subject: [PATCH] fix: remark-lint-table-cell-padding Also resolves remark-lint-table-pipes --- .remarkrc | 4 +- locale/en/blog/release/v0.6.0.md | 24 +++++----- .../cve-2015-8027_cve-2015-6764.md | 48 +++++++++---------- .../june-2016-security-releases.md | 24 +++++----- ...openssl-and-low-severity-fixes-jan-2016.md | 24 +++++----- 5 files changed, 61 insertions(+), 63 deletions(-) diff --git a/.remarkrc b/.remarkrc index 8a3d8f0002747..10cfc972f562d 100644 --- a/.remarkrc +++ b/.remarkrc @@ -11,8 +11,6 @@ ["remark-lint-no-trailing-spaces", false], ["remark-lint-no-undefined-references", false], ["remark-lint-no-unused-definitions", false], - ["remark-lint-prohibited-strings", false], - ["remark-lint-table-cell-padding", false], - ["remark-lint-table-pipes", false] + ["remark-lint-prohibited-strings", false] ] } diff --git a/locale/en/blog/release/v0.6.0.md b/locale/en/blog/release/v0.6.0.md index ef4acdf7bae92..749a3491b0cd6 100644 --- a/locale/en/blog/release/v0.6.0.md +++ b/locale/en/blog/release/v0.6.0.md @@ -22,23 +22,23 @@ The major differences between v0.4 and v0.6 are In order to support Windows we reworked much of the core architecture. There was some fear that our work would degrade performance on UNIX systems but this was not the case. Here is a Linux system we benched for demonstration: -||v0.4.12 (linux)|v0.6.0 (linux)| -|--- |--- |--- | -|http_simple.js /bytes/1024|5461 r/s|6263 r/s| -|io.js read|19.75 mB/s|26.63 mB/s| -|io.js write|21.60 mB/s|17.40 mB/s| -|startup.js|74.7 ms|49.6 ms| +| | v0.4.12 (linux) | v0.6.0 (linux) | +|----------------------------|-----------------|----------------| +| http_simple.js /bytes/1024 | 5461 r/s | 6263 r/s | +| io.js read | 19.75 mB/s | 26.63 mB/s | +| io.js write | 21.60 mB/s | 17.40 mB/s | +| startup.js | 74.7 ms | 49.6 ms | Bigger is better in http and io benchmarks, smaller is better in startup. The http benchmark was done with 600 clients on a 10GE network served from three load generation machines. In the last version of Node, v0.4, we could only run Node on Windows with Cygwin. Therefore we've gotten massive improvements by targeting the native APIs. Benchmarks on the same machine: -||v0.4.12 (windows)|v0.6.0 (windows)| -|--- |--- |--- | -|http_simple.js /bytes/1024|3858 r/s|5823 r/s| -|io.js read|12.41 mB/s|26.51 mB/s| -|io.js write|12.61 mB/s|33.58 mB/s| -|startup.js|152.81 ms|52.04 ms| +| | v0.4.12 (windows) | v0.6.0 (windows) | +|----------------------------|-------------------|------------------| +| http_simple.js /bytes/1024 | 3858 r/s | 5823 r/s | +| io.js read | 12.41 mB/s | 26.51 mB/s | +| io.js write | 12.61 mB/s | 33.58 mB/s | +| startup.js | 152.81 ms | 52.04 ms | We consider this a good intermediate stage for the Windows port. There is still work to be done. For example, we are not yet providing users with a blessed path for building addon modules in MS Visual Studio. Work will continue in later releases. diff --git a/locale/en/blog/vulnerability/cve-2015-8027_cve-2015-6764.md b/locale/en/blog/vulnerability/cve-2015-8027_cve-2015-6764.md index 0fefb7f1492f8..64106862e80e7 100644 --- a/locale/en/blog/vulnerability/cve-2015-8027_cve-2015-6764.md +++ b/locale/en/blog/vulnerability/cve-2015-8027_cve-2015-6764.md @@ -27,18 +27,18 @@ Full details of this vulnerability are embargoed until new releases are availabl Common Vulnerability Scoring System (CVSS) v3 Base Score: -| Metric | Score | -|-----------------------------|----------------------------| -| **Base Score:** | **7.5 (High)** | -| **Base Vector:** | [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) -| **Attack Vector:** | Network (AV:N) | -| **Attack Complexity:** | Low (AC:L) | -| **Privileges Required:** | None (PR:N) | -| **User Interaction:** | None (UI:N) | -| **Scope of Impact:** | Unchanged (S:U) | -| **Confidentiality Impact:** | None (C:N) | -| **Integrity Impact:** | None (I:N) | -| **Availability Impact:** | High (A:H) | +| Metric | Score | +|-----------------------------|----------------------------------------------------------------------------------------------------------------------------------------| +| **Base Score:** | **7.5 (High)** | +| **Base Vector:** | [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | +| **Attack Vector:** | Network (AV:N) | +| **Attack Complexity:** | Low (AC:L) | +| **Privileges Required:** | None (PR:N) | +| **User Interaction:** | None (UI:N) | +| **Scope of Impact:** | Unchanged (S:U) | +| **Confidentiality Impact:** | None (C:N) | +| **Integrity Impact:** | None (I:N) | +| **Availability Impact:** | High (A:H) | Complete CVSS v3 Vector: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:R/CR:L/IR:L/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:R/CR:L/IR:L/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:H). Refer to the [CVSS v3 Specification](https://www.first.org/cvss/specification-document) for details on the meanings and application of the vector components. @@ -59,18 +59,18 @@ Full details of this vulnerability are embargoed until new releases are availabl Common Vulnerability Scoring System (CVSS) v3 Base Score: -| Metric | Score | -|-----------------------------|----------------------------| -| **Base Score:** | **4.4 (Medium)** | -| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) -| **Attack Vector:** | Network (AV:N) | -| **Attack Complexity:** | Medium (AC:H) | -| **Privileges Required:** | High (PR:H) | -| **User Interaction:** | None (UI:N) | -| **Scope of Impact:** | Unchanged (S:U) | -| **Confidentiality Impact:** | None (C:N) | -| **Integrity Impact:** | None (I:N) | -| **Availability Impact:** | High (A:H) | +| Metric | Score | +|-----------------------------|----------------------------------------------------------------------------------------------------------------------------------------| +| **Base Score:** | **4.4 (Medium)** | +| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | +| **Attack Vector:** | Network (AV:N) | +| **Attack Complexity:** | Medium (AC:H) | +| **Privileges Required:** | High (PR:H) | +| **User Interaction:** | None (UI:N) | +| **Scope of Impact:** | Unchanged (S:U) | +| **Confidentiality Impact:** | None (C:N) | +| **Integrity Impact:** | None (I:N) | +| **Availability Impact:** | High (A:H) | Complete CVSS v3 Vector: [CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:R/CR:L/IR:L/AR:M/MAV:N/MAC:H/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:R/CR:L/IR:L/AR:M/MAV:N/MAC:H/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:H). Refer to the [CVSS v3 Specification](https://www.first.org/cvss/specification-document) for details on the meanings and application of the vector components. diff --git a/locale/en/blog/vulnerability/june-2016-security-releases.md b/locale/en/blog/vulnerability/june-2016-security-releases.md index cdc25a82482a7..03c0ffd211cba 100644 --- a/locale/en/blog/vulnerability/june-2016-security-releases.md +++ b/locale/en/blog/vulnerability/june-2016-security-releases.md @@ -91,18 +91,18 @@ We will be including fixes relating to Node.js HTTP processing. We categorise th Common Vulnerability Scoring System (CVSS) v3 Base Score: -| Metric | Score | -|-----------------------------|----------------------------| -| **Base Score:** | 4.8 (Medium) | -| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) -| **Attack Vector:** | Network (AV:N) | -| **Attack Complexity:** | High (AC:H) | -| **Privileges Required:** | None (PR:N) | -| **User Interaction:** | None (UI:N) | -| **Scope of Impact:** | Unchanged (S:U) | -| **Confidentiality Impact:** | Low (C:L) | -| **Integrity Impact:** | Low (I:L) | -| **Availability Impact:** | None (A:N) | +| Metric | Score | +|-----------------------------|----------------------------------------------------------------------------------------------------------------------------------------| +| **Base Score:** | 4.8 (Medium) | +| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) | +| **Attack Vector:** | Network (AV:N) | +| **Attack Complexity:** | High (AC:H) | +| **Privileges Required:** | None (PR:N) | +| **User Interaction:** | None (UI:N) | +| **Scope of Impact:** | Unchanged (S:U) | +| **Confidentiality Impact:** | Low (C:L) | +| **Integrity Impact:** | Low (I:L) | +| **Availability Impact:** | None (A:N) | Refer to the [CVSS v3 Specification](https://www.first.org/cvss/specification-document) for details on the meanings and application of the vector components. diff --git a/locale/en/blog/vulnerability/openssl-and-low-severity-fixes-jan-2016.md b/locale/en/blog/vulnerability/openssl-and-low-severity-fixes-jan-2016.md index 9c8bc3d12674a..f4a5f9c4e8edc 100644 --- a/locale/en/blog/vulnerability/openssl-and-low-severity-fixes-jan-2016.md +++ b/locale/en/blog/vulnerability/openssl-and-low-severity-fixes-jan-2016.md @@ -29,18 +29,18 @@ In addition, we have some fixes to release relating to Node.js HTTP processing. Common Vulnerability Scoring System (CVSS) v3 Base Score: -| Metric | Score | -|-----------------------------|----------------------------| -| **Base Score:** | **4.8 (Medium)** | -| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) -| **Attack Vector:** | Network (AV:N) | -| **Attack Complexity:** | High (AC:H) | -| **Privileges Required:** | None (PR:N) | -| **User Interaction:** | None (UI:N) | -| **Scope of Impact:** | Unchanged (S:U) | -| **Confidentiality Impact:** | Low (C:L) | -| **Integrity Impact:** | Low (I:L) | -| **Availability Impact:** | None (A:N) | +| Metric | Score | +|-----------------------------|----------------------------------------------------------------------------------------------------------------------------------------| +| **Base Score:** | **4.8 (Medium)** | +| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) | +| **Attack Vector:** | Network (AV:N) | +| **Attack Complexity:** | High (AC:H) | +| **Privileges Required:** | None (PR:N) | +| **User Interaction:** | None (UI:N) | +| **Scope of Impact:** | Unchanged (S:U) | +| **Confidentiality Impact:** | Low (C:L) | +| **Integrity Impact:** | Low (I:L) | +| **Availability Impact:** | None (A:N) | Refer to the [CVSS v3 Specification](https://www.first.org/cvss/specification-document) for details on the meanings and application of the vector components.