Skip to content

chore(deps): update urllib3 minimum version#1312

Merged
sl0thentr0py merged 4 commits intogetsentry:masterfrom
miketheman:miketheman/update-urllib3
Aug 2, 2022
Merged

chore(deps): update urllib3 minimum version#1312
sl0thentr0py merged 4 commits intogetsentry:masterfrom
miketheman:miketheman/update-urllib3

Conversation

@miketheman
Copy link
Copy Markdown
Contributor

@miketheman miketheman commented Jan 19, 2022

The current constraint expresses at least urllib3 version 1.10.0,
which has at least 5 CVEs open.

Projects relying on sentry-sdk will get an optimistic version of
the latest, so current test suites are already using the latest version
which patches these vulnerabilities.

Refs:

Signed-off-by: Mike Fiedler miketheman@gmail.com

@miketheman
Copy link
Copy Markdown
Contributor Author

@sl0thentr0py any chance for a review here? It's be nice to close out some if these security issues.

@miketheman
Copy link
Copy Markdown
Contributor Author

Test fails for Python 3.4 - how long are you planning on supporting legacy versions?

@sl0thentr0py
Copy link
Copy Markdown
Member

Hi @miketheman, we're looking into dropping 3.4 but we need to follow some deprecation process first, will get back to you when I know more.

@sl0thentr0py sl0thentr0py self-requested a review February 3, 2022 13:25
@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Mar 8, 2022

This pull request has gone three weeks without activity. In another week, I will close it.

But! If you comment or otherwise update it, I will reset the clock, and if you label it Status: Backlog or Status: In Progress, I will leave it alone ... forever!


"A weed is but an unloved flower." ― Ella Wheeler Wilcox 🥀

@miketheman
Copy link
Copy Markdown
Contributor Author

@sl0thentr0py any chance of coming back to this?

The current constraint expresses at least urllib3 version 1.10.0,
which has at least 5 CVEs open.

Projects relying on `sentry-sdk` will get an optimistic version of
the latest, so current test suites are already using the latest version
which patches these vulnerabilities.

Refs:

- GHSA-www2-v7xj-xrc6 (critical)
- GHSA-mh33-7rrq-662w (high)
- GHSA-hmv2-79q8-fv6g (high)
- GHSA-wqvq-5m8c-6g24 (moderate)
- GHSA-5phf-pp7p-vc2r (moderate)

Signed-off-by: GitHub <noreply@github.com>
@miketheman miketheman force-pushed the miketheman/update-urllib3 branch from abf5b05 to f945089 Compare June 27, 2022 15:58
Copy link
Copy Markdown
Member

@sl0thentr0py sl0thentr0py left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thx @miketheman and sorry for the delay.
getting rid of 3.4 will still take some time due to our 'support everything' policy internally but I've added conditional markers according to PEP 508 which should make this a bit better for the overall ecosystem security wise.

@sl0thentr0py sl0thentr0py enabled auto-merge (squash) August 2, 2022 11:46
@sl0thentr0py sl0thentr0py merged commit b7c0dc4 into getsentry:master Aug 2, 2022
@miketheman miketheman deleted the miketheman/update-urllib3 branch August 2, 2022 12:31
@miketheman
Copy link
Copy Markdown
Contributor Author

Thanks @sl0thentr0py ! Looking forward to the release and closing the vulnerable alerts.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants