Dev rejects CVE severity, makes his GitHub repo read-only

Fedor Indutny, due to a CVE report filed against his project, started getting hounded by people on the internet bringing the vulnerability to his attention.
In recent times, open-source developers have been met with an uptick in receiving debatable or, in some cases, outright bogus CVE reports filed for their projects without confirmation.
This can lead to unwarranted panic among the users of these projects and alerts being generated by security scanners, all of which turn into a source of headache for developers.
The 'node-ip' project exists on the npmjs.com registry as the 'ip' package which scores 17 million downloads weekly, making it one of the most popular IP address parsing utilities in use by JavaScript developers.
It has to do with CVE-2023-42282, a vulnerability disclosed in the project earlier this year.
The CVE has to do with the utility not correctly identifying private IP addresses supplied to it in a non-standard format, such as hexadecimal.
Although Indutny did indeed fix the issue in later versions of his project, he disputed that the bug constituted an actual vulnerability and that too of an elevated severity.
Disputing a CVE is no straightforward task either, as a GitHub security team member explained.
It requires a project maintainer to chase the CVE Numbering Authorities that had originally issued the CVE. CNAs have conventionally comprised NIST's NVD and MITRE. Over the past few years, technology companies and security vendors joined the list and are also able to issue CVEs at will.
These CVEs, along with the vulnerability description and the reported severity rating, are then syndicated and republished by other security databases, such as GitHub advisories.
Following Indutny's post on social media, GitHub lowered the severity of the CVE in their database and suggested the developer turn on private vulnerability reporting to better manage incoming reports and cut noise.
The CVE system, originally designed to help security researchers ethically report vulnerabilities in a project and catalog these after responsible disclosure, has lately attracted a segment of community members filing unverified reports.
Developers and project maintainers have pushed back.
Another npm project, micromatch which gets 64 million weekly downloads has had 'high' severity ReDoS vulnerabilities reported against it with its creators being chased by community members inquiring about the issues.
As opposed to representing an exploitable vulnerability, it ended up being a nuisance report that developers had already been chased about.
Other than just being an annoyance for project maintainers, the act of getting CVEs issued for unverified vulnerability reports is akin to stirring up a Denial of Service against a project, its creators, and its wider consumer base, and for good reasons.
A third problem arises for projects without an active maintainer.
Abandoned software projects that have not been touched in years contain vulnerabilities that, even when disclosed, will never be fixed and there exists no means to contact their original maintainer.
On receiving a vulnerability report from a researcher, these organizations may not always be able to sufficiently vet every such report independently.
CISA: Most critical open source projects not using memory safe code.


This Cyber News was published on www.bleepingcomputer.com. Publication date: Sun, 30 Jun 2024 14:35:28 +0000


Cyber News related to Dev rejects CVE severity, makes his GitHub repo read-only

CVE-2024-57929 - In the Linux kernel, the following vulnerability has been resolved: dm array: fix releasing a faulty array block twice in dm_array_cursor_end When dm_bm_read_lock() fails due to locking or checksum errors, it releases the faulty block implicitly ...
5 months ago Tenable.com
Dev rejects CVE severity, makes his GitHub repo read-only - Fedor Indutny, due to a CVE report filed against his project, started getting hounded by people on the internet bringing the vulnerability to his attention. In recent times, open-source developers have been met with an uptick in receiving debatable ...
11 months ago Bleepingcomputer.com CVE-2023-42282
Dev rejects CVE severity, makes his GitHub repo read-only - Fedor Indutny, due to a CVE report filed against his project, started getting hounded by people on the internet bringing the vulnerability to his attention. In recent times, open-source developers have been met with an uptick in receiving debatable ...
11 months ago Bleepingcomputer.com CVE-2023-42282
Dev rejects CVE severity, makes his GitHub repo read-only - Fedor Indutny, due to a CVE report filed against his project, started getting hounded by people on the internet bringing the vulnerability to his attention. In recent times, open-source developers have been met with an uptick in receiving debatable ...
11 months ago Bleepingcomputer.com CVE-2023-42282
CVE-2023-52578 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
WikiLeaks Founder Julian Assange Returns to Australia a Free Man After US Legal Battle Ends - WikiLeaks founder Julian Assange returned to his homeland Australia aboard a charter jet and raised a celebratory clenched fist as his supporters cheered on Wednesday, hours after pleading guilty to obtaining and publishing U.S. military secrets in a ...
11 months ago Securityweek.com
Securing the code: navigating code and GitHub secrets scanning - Enter the world of GitHub secrets scanning tools, the vigilant sentinels of your digital gala. Secrets scanning in GitHub is anchored by two fundamental strategies: proactive prevention and reactive detection, each serving a critical function in ...
1 year ago Securityboulevard.com
GitHub, PyTorch and More Organizations Found Vulnerable to Self-Hosted Runner Attacks - Last July, we published an article exploring the dangers of vulnerable self-hosted runners and how they can lead to severe software supply chain attacks. GitHub itself was found vulnerable, as well as various notable organizations, such as PyTorch, ...
1 year ago Securityboulevard.com
CVE-2023-53109 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
CVE-2025-38066 - In the Linux kernel, the following vulnerability has been resolved: ...
4 days ago
E-Crime Rapper 'Punchmade Dev' Debuts Card Shop - The rapper and social media personality Punchmade Dev is perhaps best known for his flashy videos singing the praises of a cybercrime lifestyle. There wasn't much to support a conclusion that Punchmade was actually doing the cybercrime things he ...
1 year ago Krebsonsecurity.com
CVE-2023-52784 - In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. ...
1 year ago Tenable.com
CVE-2025-21700 - In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion Ackermann was able to create a UAF which can be abused for privilege escalation with the following ...
4 months ago Tenable.com
GitHub code-signing certificates stolen - Another day, another access-token-based database breach. This time, the victim is Microsoft's GitHub business. On December 6, 2022, repositories from our atom, desktop, and other deprecated GitHub-owned organizations were cloned by a compromised ...
2 years ago Nakedsecurity.sophos.com
CVE-2021-47268 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
An Obsession With Impact: The Inspiring Journey of a Dreamer That Led to a Career at Microsoft - Bruce's early years were far from easy. At the tender age of 11, Bruce's mother brought home a discarded computer from his workplace. Like any child of the '90s, having a computer in his room made Bruce feel like he had struck gold. Bruce has ...
1 year ago Msrc.microsoft.com
CVE-2025-24362 - In some circumstances, debug artifacts uploaded by the CodeQL Action after a failed code scanning workflow run may contain the environment variables from the workflow run, including any secrets that were exposed as environment variables to the ...
4 months ago Tenable.com
CVE-2024-53858 - The gh cli is GitHub’s official command line tool. A security vulnerability has been identified in the GitHub CLI that could leak authentication tokens when cloning repositories containing `git` submodules hosted outside of GitHub.com and ghe.com. ...
6 months ago Tenable.com
CVE-2021-32638 - Github's CodeQL action is provided to run CodeQL-based code scanning on non-GitHub CI/CD systems and requires a GitHub access token to connect to a GitHub repository. The runner and its documentation previously suggested passing the GitHub token ...
2 years ago
Meet the Cybersecurity Defender of 2023 for the Asia Pacific Region - Securing data in today's information-saturated, hyperconnected world is not for the faint of heart. It takes savvy leadership and security ambassadors with a vision to lead the charge into a more secure digital future. Here at Cisco, we build a ...
1 year ago Feedpress.me
CVE-2023-30853 - Gradle Build Action allows users to execute a Gradle Build in their GitHub Actions workflow. A vulnerability impacts GitHub workflows using the Gradle Build Action prior to version 2.4.2 that have executed the Gradle Build Tool with the configuration ...
2 years ago
Blockchain dev's wallet emptied in "job interview" using npm package - The recruiter in question asked the developer to download npm packages from a GitHub repository, and hours later the developer discovered his MetaMask wallet had been emptied. Take-home job exercise empties dev's crypto wallet. Moments later, the ...
1 year ago Bleepingcomputer.com
CVE-2024-39501 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2025-23163 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
CVE-2024-27916 - Minder is a software supply chain security platform. Prior to version 0.0.33, a Minder user can use the endpoints `GetRepositoryByName`, `DeleteRepositoryByName`, and `GetArtifactByName` to access any repository in the database, irrespective of who ...
1 year ago