fix(deps): add pyasn1 >= 0.6.3 for CVE-2026-30922#1524
Conversation
|
Warning Rate limit exceeded
Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 34 minutes and 15 seconds. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Plus Run ID: ⛔ Files ignored due to path filters (1)
📒 Files selected for processing (1)
📝 WalkthroughWalkthroughA new direct dependency on Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~2 minutes 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Codecov Report✅ All modified and coverable lines are covered by tests. @@ Coverage Diff @@
## main #1524 +/- ##
=======================================
Coverage 91.93% 91.93%
=======================================
Files 239 239
Lines 10810 10810
=======================================
Hits 9938 9938
Misses 872 872
Flags with carried forward coverage won't be shown. Click here to find out more. 🚀 New features to boost your workflow:
|
|
/run-e2e |
ptoscano
left a comment
There was a problem hiding this comment.
Successful e2e run: https://github.com/ansible/eda-server/actions/runs/24343103614
785bb56 to
0db56f1
Compare
pyasn1 is vulnerable to Denial of Service via unbounded recursion when decoding ASN.1 data with deeply nested SEQUENCE/SET structures (CVSS 7.5). Version 0.6.3 introduces a MAX_NESTING_DEPTH limit to mitigate this. Also upgrades pyasn1-modules 0.3.0 → 0.4.2 (required for pyasn1 0.6.x compatibility). Ref: AAP-69032 Assisted by: Claude
0db56f1 to
a7f977c
Compare
|



Summary
pyasn1 >= 0.6.3as a direct constraint to address CVE-2026-30922 (CVSS 7.5 High)Changes
pyasn1 = ">=0.6.3"constraintRef: AAP-69032
Summary by CodeRabbit