Open ALRubinger opened 2 months ago
@ALRubinger we pull this dependency in through io.grpc:grpc-core
, which it appears we're already on the latest version of. we could depend explicitly on a later version of io.netty:netty-codec-http
but it seems like diverging these dependencies introduces other risks - do you have a perspective/preference here?
@worstell Yep typically in these instances I'll force an upgrade of the transitive dependency and run it through the testsuite. If ✅, I assume all is good - but of course this depends on a testsuite w/ sufficient coverage.
Note that in this instance I'd expect the risk of upgrade to be small; it's a patch update which shouldn't remove any deprecated API calls and it should be designed to be forward-compatible. Testsuites at runtime are the only way to know for sure :)
Can you link to the CVE for this?
This seems like it might be relevant issue, and the maintainers state that gRPC is not impacted.
Can you link to the CVE for this?
Ah different to the one above.
Yup and I follow where you're going with this - determining if you're using any vulnerable code paths. My recommendation is to try the upgrade regardless, because any consumers of FTL are going to have their vuln scanners light up even if we legitimately "ignore" this for us. Ideally io.grpc:grpc-core
would address this (you can even file an issue with them requesting it!) so that us and every other downstream consumer of it gets this fixed at the root where it was introduced.
Ha, Sonatype does threat scanning too and sent this report:
So ideally our fixing it up or getting the root to do it helps. We can ignore in FOSSA but it'd still flag in Sonatype :)
Patches sec vuln.