Op 20-09-2023 om 03:39 schreef Jody Garnett:
Follow up to this week's meeting.

As research for GSIP-220 I have made second attempt to update CVE-2023-35042 via a pull request <https://github.com/github/advisory-database/pull/2721> to GitHub advisory database.

As part of the pull-request review the following were updated:

CVE-2023-35042

  * https://github.com/advisories/GHSA-59x6-g4jr-4hxc
    <https://github.com/advisories/GHSA-59x6-g4jr-4hxc>


And although I cannot quite tell what was changed the original jai-ext one was updated also:

CVE-2022-24816

  * https://github.com/advisories/GHSA-v92f-jx6p-73rx
    <https://github.com/advisories/GHSA-v92f-jx6p-73rx>


The process was much more positive/successful then the attempt at working via MITRE.

The problem is that these changes don't propagate "up"'; unless GH is the CNA (CVE Numbering Authority == assigner of the CVE) the changes are on the GH side only and not in the MITRE database (https://www.cve.org/CVERecord?id=CVE-2023-35042) or the widely used NVD data/api's (https://nvd.nist.gov/vuln/detail/CVE-2023-35042)

I know the pain of trying to work with Mitre (and Sonatype as well) and unresponsive reporters; it's very discouraging at best.

Mark



_______________________________________________
Geoserver-devel mailing list
Geoserver-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/geoserver-devel

Reply via email to