-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sent vulnerabilities fixes to scanners so that they won't show up again. #16341
Comments
Sent a slack to @mmalohlava, David and Andrew: wendy |
Current suggestion from @andrewheath09 : |
Conversation with @codyharris-h2o-ai and he presents me with a spreadsheet on h2o-3 vulnerabilities. I need to do the following: Please let me know: |
@valenad1 has sent information to hunter about our custom fixes and they have replied back asking for commits and more information. He will send them everything they need after Sept 16, 2024. |
We have fixed a number of vulnerabilities reported, not by upgrading the dependencies version but rather in our own code. However, these kind of fixes will not be recognized by the scanners and will show up again and again. @tomkraljevic suggested that we should report these kind of fixes back to the scanners so that the scanners can be fixed and the fixed vulnerabilities will not come back on their scan.
Here is a list of the fixed vulnerabilities that have been fixed:
Items 1/2/3 concern the access of any directory for read and write by bad actors. It is resolved by (@krasinski ) adding a parameter -file_deny_glob that can be used to define restricted locations by the system administrators. It is currently default to {/bin/, /etc/, /var/, /usr/, /proc/*, /.}.
Discussed with @mmalohlava and he proposed that I should talk to Andrew Heath and David Epperson with these.
The text was updated successfully, but these errors were encountered: