[WIP] Update cryptography package to version >=46.0.6#3945
Closed
[WIP] Update cryptography package to version >=46.0.6#3945
Conversation
✅ Deploy Preview for nifty-bassi-e26446 ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
cryptography>=46.0.6constraint toactions/gcp/setup/requirements.inactions/gcp/setup/requirements.txtwithpip-compile --allow-unsafe --generate-hashes requirements.incryptography>=46.0.6appears in the regenerated lockfileOriginal prompt
Problem
Dependabot alert #345 (https://github.com/envoyproxy/toolshed/security/dependabot/345) flags
cryptographyversion 43.0.3 as vulnerable to a Subgroup Attack Due to Missing Subgroup Validation for SECT Curves (severity: High 8.2/10). The patched version is >=46.0.5.Dependabot cannot auto-resolve this because the
actions/gcp/setup/requirements.txtis apip-compile-generated lockfile with pinned hashes (--generate-hashes). Dependabot can't runpip-compileto regenerate it.Fix Required
actions/gcp/setup/requirements.in— ifcryptographyis pinned or constrained there, update it to allow>=46.0.6.actions/gcp/setup/requirements.txtby runningpip-compile --allow-unsafe --generate-hashes requirements.in(or whatever pip-compile command is used in this project — check for a Makefile, script, or comments at the top of the generatedrequirements.txtfor the exact command).requirements.txthascryptography>=46.0.6(or the latest secure version) with correct hashes.The key file is
actions/gcp/setup/requirements.txt(line 336 currently hascryptography==43.0.3). The source input file is likelyactions/gcp/setup/requirements.in.The following is the prior conversation context from the user's chat exploration (may be truncated):
User: not sure why dependabot isnt resolving this - but it needs to be fixed
Assistant: Unfortunately, I'm unable to directly access the Dependabot security alert #345 at
https://github.com/envoyproxy/toolshed/security/dependabot/345— Dependabot security alerts are not publicly accessible via API and require repository collaborator/admin access to view details.However, I can see that Dependabot is actively creating PRs in the repo. Here are the current open Dependabot PRs that may be related to the alert you're looking at:
Why Dependabot might not be auto-resolving alert #345:
There are several common reasons a Dependabot alert stays open even when PRs exist:
The vulnerable dependency is a transitive/indirect dependency — Dependabot can only update direct dependencies. If the vulnerability is in a transitive dep, it can't create a PR to fix it directly.
Version constraints prevent the update — If
package.json(or equivalent) pins a range that doesn't include the fixed version, Dependabot may be unable to generate a compatible update.The alert is for a different ecosystem than what Dependabot version updates are configured for (e.g., the alert might be for a pip/cargo/npm lockfile dep not covered by the
dependabot.ymlgrouping).Dependabot's open PR limit has been reached — By default, Dependabot limits itself to 5 open security PRs. With multiple large grouped PRs already open, it may be queued.
To fix this manually, you'd need to:
Would you like me to create a PR to fix a specific vulnerable dependency, or would you like me to investigate the repo's
dependabot.ymlconfiguration to understand why certain alerts might not be getting resolved?User: yeah fix it
Assistant:
Let me first look at the Dependabot alert details and the repo's dependency configuration to understand what needs to be fixed.
Assistant: I can't directly access Dependabot security alert details through the API. Let me look at the open Dependabot PRs and recent security-related activity to understand what alert #345 might be about.
Assistant: I can't directly access the Dependabot alert details through the API, so let me look at the security-related files and recent vulnerability patterns in the repo to understand what alert #345 might be about.
Assistant: I can see the repository structure now. Since I ...
This pull request was created from Copilot chat.