Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-xpw8-rcwv-8f8p] io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack #2861

Conversation

dpippenger
Copy link

Updates

  • Affected products
  • Description

Comments
The GHSA record is lacking a reference to CVE-2023-44487 in the metadata and causing problems with downstream scanning tools linking this GHSA to CVE-2023-44487. I'm hoping adding a link to the NVD entry will resolve this since there is no dedicated field in the change form to list the CVE ID.

@github
Copy link
Collaborator

github commented Oct 18, 2023

Hi there @normanmaurer! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our highly-trained Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

@github-actions github-actions bot changed the base branch from main to dpippenger/advisory-improvement-2861 October 18, 2023 17:55
@dpippenger
Copy link
Author

Moving changes to a different PR because json needs to be edited

@dpippenger dpippenger closed this Oct 18, 2023
@github-actions github-actions bot deleted the dpippenger-GHSA-xpw8-rcwv-8f8p branch October 18, 2023 21:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants