-
Notifications
You must be signed in to change notification settings - Fork 850
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2023-3635 com.squareup.okio:okio-jvm:jar:3.0.0 #5637
Comments
Hey @patpatpat123 , OkHttp version has been updated to 4.11.0 in this commit, and it's been present since release 1.26.0. We recommend updating to the latest version (1.28.0). |
it looks like the CVE was just recently fixed in while |
I checked this again, and okio-bom was updated in #5613, which will be in next month's 1.29.0 release. double checking against |
Apologies, I do use opentelemetry-exporter-otlp, which has this vulnerable dependencies. |
the upcoming release, v1.29.0, currently scheduled for Aug 11 |
Understood, preparing ourselves for this day |
Hello, it is now August 11th (at least in my current city). Still not able to get version 1.29.0. Is it still expected? |
Yes, the 1.29.0 will still be released today (during US day/EU eveninig) |
The issue still persists. What did I do wrong please? |
Something went wrong for you since you've got a mix of v1.29.0 and v1.28.0 OpenTelemetry dependencies. Even when you get things right the vulnerable dependency is not resolved though:
OpenTelemetry depends on okhttp:4.11.0, but this still has a dependency on the vulnerable okio:3.2.0. See the okhttp POM file published to Maven Central. CVE-2023-3635 reports that the vulnerability is fixed in okio:3.4.0, and this version is not the one resolved due to the okhttp dependency declarations in their POM file. This comment on a related okhttp issue suggests it will be resolved with the okhttp:4.12.0 release, but they do not seem to be in any rush to release. |
I see something different @bestbeforetoday. When I run
But when I run
What's happening is that The easy solution is to add a dependency on
I'm inclined to recommend this solution rather than publishing a patch with an updated transitive dependency version. |
The problem with that approach is that is requires all projects that depend on OpenTelemetry to explicitly implement this override (rather than just you doing it), and for all projects that depend on OpenTelemetry to have good enough test coverage of OpenTelemetry functionality that they can be confident it doesn't break anything in their environment (rather than just you testing your own project). It's a common approach amongst open source packages, but it's not a great one for consumers (including other open source packages). |
Just did a little more investigation and determined that this CVE is not relevant to
|
I think we're in a tough position here because We've verified that the non-vulnerable But if we pass along these non-aligned versions of |
I agree. You are in the same boat as all your dependent projects getting flagged up for this vulnerability. What is really needed is for okhttp to update their dependency on okio and release |
Describe the bug
Hello team,
I have a project where I have this dependency:
When running several static analysis scanners, such as dependency-check, sonarqube, blackduck, checkmarx, etc, all of them recognize this package as vulnerable, because it is pulling com.squareup.okio:okio-jvm:jar:3.0.0
Please see the dependency tree:
Steps to reproduce
Run a vulnerability scanner, such as dependency-check, sonarqube, blackduck, checkmarx, on io.opentelemetry:opentelemetry-exporter-otlp:jar:1.25.0
What did you expect to see?
I hope to not see any vulnerabilities
What did you see instead?
A CVE
What version and what artifacts are you using?
1.25.0
Environment
Compiler: (e.g., "Temurin 17.0.7") GraalVM 17
Additional context
This is my first issue here, hope this is not a trouble.
I wanted to raise the issue on opentelemetry-exporter-otlp but could not find the repo.
If not anything, thank you for your time
The text was updated successfully, but these errors were encountered: