Upgrade snappy-java to 1.1.10.8 from 1.1.8.4 to fix security vulnerabilities #14
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
This PR upgrades
snappy-javafrom1.1.8.4to1.1.10.8to address multiple security vulnerabilitiesSecurity Fixes
This upgrade addresses the following CVEs:
Changes
1. Dependency Update (
project.clj)org.xerial.snappy/snappy-javafrom1.1.8.4to1.1.10.82. Security Tests (
test/byte_transforms_snappy_security_test.clj)Added 8 test suites with 31 assertions to verify the security fixes:
test-snappy-large-data-compression- Tests 100MB data handling (CVE-2023-34455)test-snappy-highly-compressible-data- Tests edge cases with zeros and patternstest-snappy-edge-case-sizes- Tests empty, single byte, power-of-2, and chunk boundary sizestest-snappy-random-data-robustness- Tests random data patterns (CVE-2023-34454, CVE-2023-34453)test-snappy-streaming-large-data- Tests 50MB streaming compression (CVE-2023-34455)test-snappy-all-byte-values- Tests all possible byte valuestest-snappy-repeated-compression- Tests 10 rounds of compression/decompression (CVE-2023-43642)test-snappy-concurrent-operations- Tests parallel compression operations (CVE-2023-43642)