Closed taylorjdawson closed 4 months ago
This PR addresses security vulnerabilities by updating key dependencies to their latest, patched versions, ensuring SOC2 compliance.
This is a huge amount of new code.
Has it been reviewed? I believe the policy for qos is to review every dependency line by line.
It could take a day or more to review the diffs between all these libraries for supply chain attacks, so should probably flag this for approval to spend that much time.
Are we actually patching any vulns that impact any actual codepaths we use?
CC @jack-kearney
What I'd like to propose is the following:
Quick update on this:
as I understand it,
Also note that some already-merged previous PRs have partially improved the situation by bumping versions for known problems in some sub-crates, for example the problematic time
version (that leads to a potential segfault DOS) is now only used in src/qos_enclave/Cargo.lock.
Summary & Motivation (Problem vs. Solution)
This PR addresses security vulnerabilities by updating key dependencies to their latest, patched versions, ensuring SOC2 compliance.
Vulnerable Package Updates
1.1.0
1.3.0
root@0.8.8
,qos_enclave@0.8.6
0.8.11
0.11.1
0.12.1
0.10.52
0.10.64
0.1.45
0.3.36
0.37.15
0.38.34
Required Package Updates
1.28.0
1.38.0
mio
0.2.148
0.2.155
1.2.2
1.3.1
shlex
,vmm-sys-util
,openssl
,rustix
Irremediable
rsa
- MEDIUMWork is ongoing to resolve this vulnerability.
rsa
is a dependency ofyubikey
, and it is anticipated thatyubikey
will update theirrsa
dependency to the latest patched version once available.atty
- LOWAs of now, there is no known remediation for
atty
, and the package appears to be unmaintained, according to GitHub vulnerability information.atty
is a dependency ofclap
, which is a Rust command line parser used bynitro-cli
. Newer versions ofclap
have removedatty
as a dependency.How I Tested These Changes
make test
&make build
in affected modulesPre merge check list