Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(security): update okhttp3 to get ridof vulnerabilities CVE-2023-3635 #114

Merged
merged 2 commits into from
Feb 5, 2025

Conversation

Superkunair
Copy link
Contributor

CVE-2021-0341 (okhttp):

Description: This vulnerability in OkHostnameVerifier.java could allow a certificate for the wrong domain to be accepted due to improperly used cryptography. This can lead to remote information disclosure without requiring additional execution privileges1.
Affected Versions: All versions of okhttp v3.x and v4.x are affected.
CVE-2023-3635 (okio):

Description: The GzipSource class does not handle exceptions properly when parsing a malformed gzip buffer. This can lead to a denial of service (DoS) when handling a crafted GZIP archive2.

Proposed Solution
Both issues are solved by updating okhttp to 4.12.0

@Superkunair
Copy link
Contributor Author

This references to: #113 - Update okhttp Library to Address CVE-2021-0341 and CVE-2023-3635 #113

@apederson94
Copy link
Contributor

I approved this MR, but you'll need to rebase as well

@apederson94
Copy link
Contributor

apederson94 commented Feb 5, 2025

@zromano should we be expecting the integration tests to fail like this?

@zromano
Copy link
Contributor

zromano commented Feb 5, 2025

@apederson94 Yeah, they will fail until merging for non-members due to a permissions issue.

This has been something I mean to look into, but it's mostly members creating PRs, so I hadn't gotten around to it.

Also thank you @Superkunair for the contribution!!

@zromano zromano merged commit ea6481d into smartsheet:mainline Feb 5, 2025
2 of 3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants