-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
okhttp High Security Vulnerability in kubernetes-client 5.12.2 #4290
Comments
ContextThe client uses OkHttp version We've had many discussions about bumping the OkHttp client to 4 (#2764, #2632), but due to the introduction of Kotlin specific dependencies, we decided to remain on version 3. However, you can configure your project to use a different OkHttp version that the one we provide. In the Using a different OkHttp version with the client section I provide more details. We've done a lot of work in version 6 to be able to decouple OkHttp completely from the project and be able to provide alternate HTTP client implementations. In version 6.0.0 we already introduced two new options, but more are coming. Using a different OkHttp version with the clientNewer OkHttp versions (4) should be binary backwards compatible with OkHttp 3. In scope of #2632, we documented how you can achieve this in your project #2632 (comment). So you should be able to follow this procedure for any Fabric8 Kubernetes Client version. HTTP clients in version 6+Starting from version 6 we provide additional HTTP client implementations which you can use instead of OkHttp. So far we've implemented a vanilla JDK HTTP client, and an Eclipse Jetty based client. However, both of this clients require JDK 11+. We will keep providing more client implementations. Next up is Vert.x. We'll probably implement an additional HTTP client based on OkHttp 4 too. Proposed solutions for Apache FlinkThe easiest solution for you right now is to override the OkHttp client version. This should be a very easy change (just a few lines in your I see your project is based on Java 11. If you're upgrading to version 6 of the client, then you should also be able to try the other HTTP client implementations. Beware that these haven't been battle-tested yet. |
For Java Operator SDK created PR: This is fixing the issues, in terms that all |
This issue has been automatically marked as stale because it has not had any activity since 90 days. It will be closed if no further activity occurs within 7 days. Thank you for your contributions! |
Describe the bug
We're utilizing the Fabric8 kubernetes-client 5.12.2 in our Flink Kubernetes Operator here
But we've found a vulnerability in the okhttp version:
@mbalassi noticed that even your latest v6.0.0-RC1 still has the older okhttp version here:
https://github.com/fabric8io/kubernetes-client/blob/v6.0.0-RC1/pom.xml#L84
Is this relevant? Is it possible to bump the okhttp version to 4.9.2?
Alternatively, there's a discussion here #2764 that would ultimately bump the okhttp version to 4.9.x and might solve the problem as well.
Thanks
Fabric8 Kubernetes Client version
5.12.2
Steps to reproduce
Using twistlock security scan of our operator image, we're seeing a security vulnerability against the older okhttp version utilized.
Expected behavior
Expected the scan to be clean of vulnerabilities
Runtime
OpenShift
Kubernetes API Server version
1.22
Environment
Linux
Fabric8 Kubernetes Client Logs
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: