fix(rust): bump aws-lc-rs to 1.16.2 to patch aws-lc-sys CVE (Dependabot #501)#3946
Closed
fix(rust): bump aws-lc-rs to 1.16.2 to patch aws-lc-sys CVE (Dependabot #501)#3946
Conversation
✅ Deploy Preview for nifty-bassi-e26446 ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
…pendabot #501) Agent-Logs-Url: https://github.com/envoyproxy/toolshed/sessions/fe27ed7c-7ff9-4b00-bb75-fdee6d44a2ff Co-authored-by: phlax <454682+phlax@users.noreply.github.com>
Copilot
AI
changed the title
[WIP] Update aws-lc-sys to version 0.39.0 for security fix
fix(rust): bump aws-lc-rs to 1.16.2 to patch aws-lc-sys CVE (Dependabot #501)
Apr 1, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
aws-lc-sys >= 0.32.0, < 0.39.0is vulnerable to X.509 Name Constraints Bypass via Wildcard/Unicode CN (CVSS 8.2). Dependabot couldn't auto-resolve because the transitive parentaws-lc-rs 1.16.1cappedaws-lc-sysat0.38.0.Changes
rust/Cargo.lock—cargo update -p aws-lc-rsbumps the chain:aws-lc-rs:1.16.1→1.16.2aws-lc-sys:0.38.0→0.39.1(patched)Dependency path:
echocrate →axum-server[tls-rustls]→rustls→aws-lc-rs→aws-lc-sysNo
Cargo.tomlchanges required; existing semver constraints already admitted1.16.2.Original prompt
Problem
Dependabot alert #501 (https://github.com/envoyproxy/toolshed/security/dependabot/501) flags
aws-lc-sys(Rust) inrust/Cargo.lockas vulnerable to AWS-LC X.509 Name Constraints Bypass via Wildcard/Unicode CN (severity: High 8.2/10).aws-lc-sys(Rust)>= 0.32.0, < 0.39.00.39.0rust/Cargo.lockDependabot says "Dependabot cannot update to the required version" — "One or more other dependencies require a version that is incompatible with this update." This means some crate(s) in the dependency tree have version constraints that cap
aws-lc-sysbelow0.39.0.Fix Required
rust/Cargo.toml(and any workspace memberCargo.tomlfiles) to find which crates transitively depend onaws-lc-sys. The likely culprits are crates likeaws-lc-rs,rustls,tokio-rustls,reqwest, or similar TLS/crypto crates.aws-lc-sys >= 0.39.0.rust/Cargo.lock(by runningcargo updateorcargo generate-lockfilein therust/directory) so thataws-lc-sysresolves to>= 0.39.0.aws-lc-sysversion in the vulnerable range>= 0.32.0, < 0.39.0.The following is the prior conversation context from the user's chat exploration (may be truncated):
User: not sure why dependabot isnt resolving this - but it needs to be fixed
Assistant: Unfortunately, I'm unable to directly access the Dependabot security alert #345 at
https://github.com/envoyproxy/toolshed/security/dependabot/345— Dependabot security alerts are not publicly accessible via API and require repository collaborator/admin access to view details.However, I can see that Dependabot is actively creating PRs in the repo. Here are the current open Dependabot PRs that may be related to the alert you're looking at:
Why Dependabot might not be auto-resolving alert #345:
There are several common reasons a Dependabot alert stays open even when PRs exist:
The vulnerable dependency is a transitive/indirect dependency — Dependabot can only update direct dependencies. If the vulnerability is in a transitive dep, it can't create a PR to fix it directly.
Version constraints prevent the update — If
package.json(or equivalent) pins a range that doesn't include the fixed version, Dependabot may be unable to generate a compatible update.The alert is for a different ecosystem than what Dependabot version updates are configured for (e.g., the alert might be for a pip/cargo/npm lockfile dep not covered by the
dependabot.ymlgrouping).Dependabot's open PR limit has been reached — By default, Dependabot limits itself to 5 open security PRs. With multiple large grouped PRs already open, it may be queued.
To fix this manually, you'd need to:
Would you like me to create a PR to fix a specific vulnerable dependency, or would you like me to investigate the repo's
dependabot.ymlconfiguration to understand why certain alerts might not be getting resolved?User: yeah fix it
Assistant:
Let me first look at the Dependabot alert details and the repo's dependency configuration to understand what needs to be fixed.
Assistant: I can't directly access Dependabot security alert details through the API. Let me look at the open Dependabot PRs and recent security-related activity to understand what alert #345 might be about.
Assistant: I can't directly access the Dependabot alert details through the API, so let me look at the security-related files and recent vulnerability patterns in the repo to understand what alert #345 migh...
This pull request was created from Copilot chat.