Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade to okhttp 5.x #846

Closed
ovolynets opened this issue Aug 6, 2021 · 3 comments · Fixed by #849
Closed

Upgrade to okhttp 5.x #846

ovolynets opened this issue Aug 6, 2021 · 3 comments · Fixed by #849
Labels
Milestone

Comments

@ovolynets
Copy link

Is your feature request related to a problem? Please describe.
The currently used version of okhttp (version 3.14) has been discovered CVE-2021-0341, here it is used:

<okhttp.version>3.14.4</okhttp.version>

Also Sonatype IQ Server reports this transient dependency while scanning the project for CVEs.

Describe the solution you'd like
I suggest to consider an upgrade to a more recent release of okhttp, latest being 5.0.0-alpha.2. Earlier releases such as 4.9.1 currently do not have the fix included yet, unfortunately.
I am not sure without looking at the code that uses okhttp whether this vulnerability can be exploited at all here - I'd ask the develop team to check for this. Thank you.

Additional context
Related issue reported in okhttp

@ovolynets
Copy link
Author

ovolynets commented Aug 10, 2021 via email

@wind57
Copy link
Contributor

wind57 commented Aug 11, 2021

Oleksandr,

The solution to this issue really depends on what is going to happen here. Notice that I closed 847, on purpose, and opened 849.

@ryanjbaxter ryanjbaxter linked a pull request Aug 17, 2021 that will close this issue
@ryanjbaxter ryanjbaxter added this to the 2.0.4 milestone Aug 17, 2021
@ryanjbaxter ryanjbaxter modified the milestones: 2.0.4, 2.0.5 Sep 23, 2021
@wind57
Copy link
Contributor

wind57 commented Oct 30, 2021

@ryanjbaxter this can be closed now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants