📦 Bump versions of multiple dependencies to address vulnerabilities#1
Open
NelsonDivyamLobo wants to merge 2 commits intomainfrom
Open
📦 Bump versions of multiple dependencies to address vulnerabilities#1NelsonDivyamLobo wants to merge 2 commits intomainfrom
NelsonDivyamLobo wants to merge 2 commits intomainfrom
Conversation
added 2 commits
November 11, 2025 01:54
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Lineaje has automatically created this pull request to resolve the following CVEs:
containing data intended for one client may be cached and
subsequently sent by a proxy to other clients. If the proxy
also caches
Set-Cookieheaders, it may send one client'ssessioncookie to other clients. The severity depends onthe application's use of the session, and the proxy's
behavior regarding cookies. The risk depends on all these
conditions being met. 1. The application must be hosted
behind a caching proxy that does not strip cookies or ignore
responses with cookies. 2. The application sets
session.permanent =<br>True.2. The application does not access or modify the session at
any point during a request. 4.
SESSION_REFRESH_EACH_REQUESTis enabled (the default). 5. The application does not set a
Cache-Controlheader to indicate that a page is private orshould not be cached. This happens because vulnerable
versions of Flask only set the
Vary: Cookieheader when thesession is accessed or modified, not when it is refreshed
(re-sent to update the expiration) without being accessed or
modified.
CWE-20: Improper Input Validation vulnerability in flask that
can result in Large amount of memory usage possibly leading
to denial of service. This attack appear to be exploitable
via Attacker provides JSON data in incorrect encoding. This
vulnerability appears to have been fixed in 0.12.3.
unexpected memory usage. The impact is denial of service. The
attack vector is crafted encoded JSON data. The fixed version
is 1. NOTE this may overlap CVE-2018-1000656.
may lead OpenSSL to crash leading to a potential Denial of
Service attack Impact summary: Applications loading files in
the PKCS12 format from untrusted sources might terminate
abruptly. A file in PKCS12 format can contain certificates
and keys and may come from an untrusted source. The PKCS12
specification allows certain fields to be NULL, but OpenSSL
does not correctly check for this case. This can lead to a
NULL pointer dereference that results in OpenSSL crashing. If
an application processes PKCS12 files from an untrusted
source using the OpenSSL APIs then that application will be
vulnerable to this issue. OpenSSL APIs that are vulnerable to
this are: PKCS12_parse(), PKCS12_unpack_p7data(),
PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and
PKCS12_newpass(). We have also fixed a similar issue in
SMIME_write_PKCS7(). However since this function is related
to writing data we do not consider it security significant.
The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this
issue.
vulnerabilities, which would impact people using RSA
decryption in online scenarios. This is fixed in cryptography
3.2.
of OpenSSL. The versions of OpenSSL included in cryptography
0.8.1-39.0.0 are vulnerable to a security issue. More details
about the vulnerabilities themselves can be found in
https://www.openssl.org/news/secadv/20221213.txt and
https://www.openssl.org/news/secadv/20230207.txt. If you are
building cryptography source ("sdist") then you are
responsible for upgrading your copy of OpenSSL. Only users
installing from wheels built by the cryptography project
(i.e., those distributed on PyPI) need to update their
cryptography versions.
Cipher.update_intowould accept Python objectswhich implement the buffer protocol, but provide only
immutable buffers:
pycon >>> outbuf = b"\x00" * 32 >>> c =<br>ciphers.Cipher(AES(b"\x00" * 32), modes.ECB()).encryptor()<br>>>> c.update_into(b"\x00" * 16, outbuf) 16 >>> outbuf<br>b'\xdc\x95\xc0x\xa2@\x89\x89\xadH\xa2\x14\x92\x84<br>\x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'<br>This would allow immutable objects (such asbytes) tobe mutated, thus violating fundamental rules of Python. This
is a soundness bug -- it allows programmers to misuse an API,
it cannot be exploited by attacker controlled data alone.
This now correctly raises an exception. This issue has been
present since
update_intowas originally introduced incryptography 1.8.
of OpenSSL. The versions of OpenSSL included in cryptography
0.5-40.0.2 are vulnerable to a security issue. More details
about the vulnerability itself can be found in
https://www.openssl.org/news/secadv/20230530.txt. If you are
building cryptography source ("sdist") then you are
responsible for upgrading your copy of OpenSSL. Only users
installing from wheels built by the cryptography project
(i.e., those distributed on PyPI) need to update their
cryptography versions.
of OpenSSL. The versions of OpenSSL included in cryptography
0.8-41.0.2 are vulnerable to several security issues. More
details about the vulnerabilities themselves can be found in
https://www.openssl.org/news/secadv/20230731.txt,
https://www.openssl.org/news/secadv/20230719.txt, and
https://www.openssl.org/news/secadv/20230714.txt. If you are
building cryptography source ("sdist") then you are
responsible for upgrading your copy of OpenSSL. Only users
installing from wheels built by the cryptography project
(i.e., those distributed on PyPI) need to update their
cryptography versions.
issue may allow a remote attacker to decrypt captured
messages in TLS servers that use RSA key exchanges, which may
lead to exposure of confidential or sensitive data.
You can merge this PR once the tests pass and the changes are reviewed.
Thank you for reviewing the update! 🚀