Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-qppj-fm5r-hxr3] swift-nio-http2 vulnerable to HTTP/2 Stream Cancellation Attack #2874

Conversation

faroukfaiz10
Copy link

Updates

  • Affected products

Comments
Grpc-go is also affected: grpc/grpc-go#6703.
Release notes at https://github.com/grpc/grpc-go/releases for a reference to the patched versions.

@github
Copy link
Collaborator

github commented Oct 20, 2023

Hi there @Lukasa! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our highly-trained Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

@github-actions github-actions bot changed the base branch from main to faroukfaiz10/advisory-improvement-2874 October 20, 2023 15:16
@advisory-database advisory-database bot merged commit 9306d3c into faroukfaiz10/advisory-improvement-2874 Oct 31, 2023
2 checks passed
@advisory-database advisory-database bot deleted the faroukfaiz10-GHSA-qppj-fm5r-hxr3 branch October 31, 2023 22:28
@advisory-database
Copy link
Contributor

Hi @faroukfaiz10! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants