Description
Summary
GHSA-qppj-fm5r-hxr3 is currently linked via aliases to CVE-2023-44487. It contains packages from two different ecosystems (swift, and golang). Would the github advisories team accept a PR that adds more packages to this entry as enumerated by the Known Affected Software Configurations on CVE-2023-44487?
Since the record is specifically filed for the swift-nio-http2 implementation is it better to get a new GHSA created per specific package found in the configurations?
I'd like to start getting these cataloged in the advisory database, but want to make sure I'm doing it in a way that the team agrees on.
I saw #2908 had been filed to modify GHSA-xpw8-rcwv-8f8p (the netty codec implementation of this broad CVE) which added a reference as an identifier given that the alias was already taken by GHSA-qppj-fm5r-hxr3.
It seems there are two approaches currently in the data:
-
Individual GHSA per implementation or package with a reference link to the upstream CVE
-
The original auto aliased GHSA which contains information specific to swift, but also has separate, but semi related golang packages as a part of the affected packages list.
I would love to hear the teams thoughts on what they view as the correct orientation for adding more packages to the database that are listed as vulnerable under this CVE =)
Related issue: #2869