Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-wx5j-54mm-rqqq] HTTP request smuggling in netty #4496

Open
wants to merge 1 commit into
base: SunBK201/advisory-improvement-4496
Choose a base branch
from

Conversation

SunBK201
Copy link

@SunBK201 SunBK201 commented Jun 5, 2024

Updates

  • Affected products

Comments
According to Patch, this vulnerability was introduced from 4.0.0.Beta2.

@github
Copy link
Collaborator

github commented Jun 5, 2024

Hi there @normanmaurer! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

@github-actions github-actions bot changed the base branch from main to SunBK201/advisory-improvement-4496 June 5, 2024 14:08
@shelbyc
Copy link

shelbyc commented Jun 5, 2024

👋 Hi @SunBK201, where in netty/netty@07aa6b5 did you see that io.netty:netty-codec-http became vulnerable in 4.0.0.Beta2? I'm unable to find that information at the provided link.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants