Skip to content

GHSA-qppj-fm5r-hxr3 - How do we proceed with adding new packages? #2920

Closed
@spiffcs

Description

@spiffcs

Summary

GHSA-qppj-fm5r-hxr3 is currently linked via aliases to CVE-2023-44487. It contains packages from two different ecosystems (swift, and golang). Would the github advisories team accept a PR that adds more packages to this entry as enumerated by the Known Affected Software Configurations on CVE-2023-44487?

Since the record is specifically filed for the swift-nio-http2 implementation is it better to get a new GHSA created per specific package found in the configurations?

I'd like to start getting these cataloged in the advisory database, but want to make sure I'm doing it in a way that the team agrees on.

I saw #2908 had been filed to modify GHSA-xpw8-rcwv-8f8p (the netty codec implementation of this broad CVE) which added a reference as an identifier given that the alias was already taken by GHSA-qppj-fm5r-hxr3.

It seems there are two approaches currently in the data:

  1. Individual GHSA per implementation or package with a reference link to the upstream CVE

  2. The original auto aliased GHSA which contains information specific to swift, but also has separate, but semi related golang packages as a part of the affected packages list.

I would love to hear the teams thoughts on what they view as the correct orientation for adding more packages to the database that are listed as vulnerable under this CVE =)

Related issue: #2869

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions