-
Notifications
You must be signed in to change notification settings - Fork 482
[GHSA-g8m5-722r-8whq] Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks #5408
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[GHSA-g8m5-722r-8whq] Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks #5408
Conversation
|
Hi there @joakime! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository. This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory |
|
Reject. First, the Eclipse CNA is the one managing this CVE, not Github. |
joakime
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reject.
6e7e76a
into
levpachmanov/advisory-improvement-5408
|
Hi @levpachmanov! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
|
Good morning @levpachmanov and @joakime, and sorry about the confusion! The only change made to the advisory with the merge was adding credit for @levpachmanov, and neither jetty/jetty.project#12200 nor jetty/jetty.project#12201 were incorporated into the list of reference links. Since the changes suggested by @levpachmanov weren't incorporated into GHSA-g8m5-722r-8whq, I'll start the process of undoing the change that was made, which in this case was just adding a credit. @joakime I have a question about jetty/jetty.project#11723, which is listed as a reference link in https://nvd.nist.gov/vuln/detail/CVE-2024-8184 and GHSA-g8m5-722r-8whq. Is jetty/jetty.project#11723 still relevant to CVE-2024-8184, or should that reference link be removed as well? |
|
@shelbyc as the github advisory database schema doesn't support the CVE tag |
Also, for the record, this vulnerability was reported to us by @HRsGIT on Apr 4, 2024, and has been so indicated on both the github advisory side and the CVE side. Assigning credit to @levpachmanov is dubious, what exactly is this user being credited for on this vulnerability? |
|
@joakime the PR was merged in error when it should have been closed. The only change made in the PR merge was to add credit to @levpachmanov. At no point were jetty/jetty.project#12200 or jetty/jetty.project#12201 added to the references. The only PR included as a reference link is jetty/jetty.project#11723. GHSA-g8m5-722r-8whq has been corrected to remove the erroneous credit, since the suggested links of jetty/jetty.project#12200 and jetty/jetty.project#12201 weren't actually incorporated into the advisory. |
|
Hi @levpachmanov! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
Updates
Comments
Added references of the 9.x and 10.x fixes