-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Rust vulns 9th may 2025 #11251
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rust vulns 9th may 2025 #11251
Conversation
098a36b
to
1e9b992
Compare
Bump the crates to update them and pull in a newer version of borsh to remediate RUSTSEC-2023-0033 Signed-off-by: stevenhorsman <steven@uk.ibm.com>
Bump hyper version to update and remediate CVE-2023-26964 Signed-off-by: stevenhorsman <steven@uk.ibm.com>
Bump bumpalo version to remediate RUSTSEC-2022-0078 Signed-off-by: stevenhorsman <steven@uk.ibm.com>
1e9b992
to
35ed3a2
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you please list what specific vulnerabilities are fixed by this and how you did the crate updates? To my untrained eye, the change in src/agent/Cargo.lock
for example does not look like a security fix.
The specific vulnerabilities and the crates updated (with |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry, I missed the references in the commit messages. Thanks for updating the PR description, too!
LGTM!
I wonder whether we should use a common version throughout the repo (looks like each Cargo.lock has a different one now: https://github.com/search?q=repo%3Akata-containers%2Fkata-containers%20bumpalo&type=code). But that may be a broader question that we don't need to address here.
Yeah I would love to find a nice way to santise all our dependencies, but didn't want to risk trying to use this PR to get them all at the same point. My dependabot config PR (#11016) might help keep them in track better later, though a single source would be nice! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me, thanks @stevenhorsman for taking care of the CVEs ❤️
A few crate updates to help with some vulnerabilities that internal security scans found: