Skip to content

Fix snyk vulnerabilities#92

Open
aayushoj-s1 wants to merge 6 commits intomasterfrom
fix-vector-vuln-snyk
Open

Fix snyk vulnerabilities#92
aayushoj-s1 wants to merge 6 commits intomasterfrom
fix-vector-vuln-snyk

Conversation

@aayushoj-s1
Copy link
Copy Markdown

@aayushoj-s1 aayushoj-s1 commented May 7, 2026

Upgrading packages to address snyk vulnerabilities

New Snyk report:

✗ [HIGH] Out-of-Bounds
   Finding ID: SNYK-RUST-RAND-16073005
   Info: https://snyk.io/vuln/SNYK-RUST-RAND-16073005
   Introduced by: vector@
   Introduced through: vector@ > rand@0.7.3
   Risk Score: N/A

 ✗ [HIGH] Infinite loop
   Finding ID: SNYK-RUST-HICKORYPROTO-16346342
   Info: https://snyk.io/vuln/SNYK-RUST-HICKORYPROTO-16346342
   Introduced by: vector@
   Introduced through: vector@ > hickory-proto@0.24.4
   Risk Score: N/A

 ✗ [HIGH] Memory Allocation with Excessive Size Value
   Finding ID: SNYK-RUST-THRIFT-16432495
   Info: https://snyk.io/vuln/SNYK-RUST-THRIFT-16432495
   Introduced by: vector@
   Introduced through: vector@ > thrift@0.17.0
   Risk Score: N/A

 ✗ [HIGH] Observable Timing Discrepancy
   Finding ID: SNYK-RUST-RSA-6092045
   Info: https://snyk.io/vuln/SNYK-RUST-RSA-6092045
   Introduced by: vector@
   Introduced through: vector@ > rsa@0.9.10
   Risk Score: N/A

 ✗ [HIGH] Out-of-bounds Read
   Finding ID: SNYK-RUST-RUSTLSWEBPKI-16300213
   Info: https://snyk.io/vuln/SNYK-RUST-RUSTLSWEBPKI-16300213
   Introduced by: vector@
   Introduced through: vector@ > rustls-webpki@0.101.7 and 1 other path
   Risk Score: N/A

 ✗ [HIGH] Inefficient Algorithmic Complexity
   Finding ID: SNYK-RUST-HICKORYPROTO-16346057
   Info: https://snyk.io/vuln/SNYK-RUST-HICKORYPROTO-16346057
   Introduced by: vector@
   Introduced through: vector@ > hickory-proto@0.24.4
   Risk Score: N/A

 ✗ [CRITICAL] Out-of-Bounds
   Finding ID: SNYK-RUST-FLATBUFFERS-1912881
   Info: https://snyk.io/vuln/SNYK-RUST-FLATBUFFERS-1912881
   Introduced by: vector@
   Introduced through: vector@ > flatbuffers@25.12.19
   Risk Score: N/A


╭───────────────────────────────────────────────────────────╮
│ Test Summary                                              │
│                                                           │
│   Organization:      observoai                            │
│   Test type:         open-source                          │
│   Project path:      .                                    │
│                                                           │
│   Total security issues: 20                               │
│   Ignored: 0 [ 0 CRITICAL  0 HIGH  0 MEDIUM  0 LOW ]      │
│   Open   : 20 [ 1 CRITICAL  6 HIGH  10 MEDIUM  3 LOW ]    │
╰───────────────────────────────────────────────────────────╯
💡 Tip

   To view ignored issues, use the --include-ignores option.

aayushoj-s1 and others added 6 commits May 7, 2026 12:57
Upgrades object_store 0.6.1 -> 0.10.2 and parquet 39.0.0 -> 55.2.0 in
the workspace to drop their old transitive deps:
- ring 0.16.20 -> 0.17.x (object_store 0.6.1 was the last holder of the
  vulnerable 0.16 line; SNYK-RUST-RING-9376718)
- flatbuffers 23.5.26 -> 25.12.19 (via newer arrow-ipc;
  SNYK-RUST-FLATBUFFERS-1912881)

Test changes are limited to parquet's tests: parquet 55 replaced
ColumnReader::read_batch with read_records, which has a different return
tuple ((records_read, values_read, levels_read)) and writes only
non-null values into the values buffer, so assert_column was rewritten
to use Vec::with_capacity buffers and to compare values.as_slice()
against the expected non-null values directly. The rep_levels assertion
also tolerates an empty buffer when the column has no repetition,
because parquet 55 no longer pre-fills zeros for max_rep_level=0
columns.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
reqwest moved its TLS stack from rustls 0.22 to rustls 0.23 between
0.12.4 and 0.12.9, so this patch-only bump removes the
databend-client > reqwest > rustls-webpki@0.102.2 chain. The new
rustls 0.23 line then resolves rustls-webpki@0.103.4 -> 0.103.13,
which carries the GHSA-82j2-j2ch-gfr8 fix.

Snyk high+ paths: 9 -> 8. trivy HIGH still shows the two
rustls-webpki entries held by AWS SDK / async-nats (0.101.7) and by
bollard/rumqttc/tonic 0.11 (0.102.2).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
bollard 0.18 moved its TLS stack from rustls 0.22 to rustls 0.23, so
this bump removes bollard from the holders of rustls-webpki@0.102.2
(GHSA-82j2-j2ch-gfr8). The vulnerability line item itself remains
because rumqttc 0.24 and tonic 0.11 still pin the 0.102 line, but the
bollard chain is now resolved through the patched rustls-webpki 0.103.13.

bollard 0.18 split connect_with_local* / connect_with_unix* /
connect_with_named_pipe* behind the new "pipe" feature and moved http
defaults behind "http", so the workspace dep adds those (matching
bollard's default = ["http", "pipe"]) on top of the existing "ssl" and
"chrono".

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@aayushoj-s1 aayushoj-s1 changed the title Fix snyk vuln Fix snyk vulnerabilities May 8, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant