Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade sympy from 1.10.1 to 1.12 #91

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

AdamOswald
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • requirements.txt
⚠️ Warning
transformers 4.30.2 has requirement tokenizers!=0.11.3,<0.14,>=0.11.1, but you have tokenizers 0.15.0.
torch 1.13.1 requires nvidia-cuda-runtime-cu11, which is not installed.
torch 1.13.1 requires nvidia-cublas-cu11, which is not installed.
torch 1.13.1 requires nvidia-cuda-nvrtc-cu11, which is not installed.
torch 1.13.1 requires nvidia-cudnn-cu11, which is not installed.
tensorboard 2.11.2 has requirement protobuf<4,>=3.9.2, but you have protobuf 4.24.4.
tensorboard 2.11.2 has requirement setuptools>=41.0.0, but you have setuptools 39.0.1.
scikit-learn 1.0.2 requires scipy, which is not installed.
python-igraph 0.11.3 has requirement igraph==0.11.3, but you have igraph 0.10.8.
powerlaw 1.5 requires scipy, which is not installed.
pipenv 2023.10.3 has requirement setuptools>=67, but you have setuptools 39.0.1.
paddlenlp 2.6.1 requires seqeval, which is not installed.
paddlenlp 2.6.1 has requirement protobuf==3.20.2, but you have protobuf 4.24.4.
paddlenlp 2.6.1 has requirement dill<0.3.5, but you have dill 0.3.7.
paddlenlp 2.6.1 has requirement multiprocess<=0.70.12.2, but you have multiprocess 0.70.15.
paddle2onnx 0.9.5 has requirement onnx<=1.9.0, but you have onnx 1.14.1.
onnxruntime 1.14.1 requires sympy, which is not installed.
onnxruntime 1.14.1 has requirement numpy>=1.21.6, but you have numpy 1.21.3.
onnxruntime-gpu 1.14.1 requires sympy, which is not installed.
onnxruntime-gpu 1.14.1 has requirement numpy>=1.21.6, but you have numpy 1.21.3.
lpips 0.1.4 requires scipy, which is not installed.
filterpy 1.4.5 requires scipy, which is not installed.
facexlib 0.3.0 requires scipy, which is not installed.
datasets 2.13.2 has requirement dill<0.3.7,>=0.3.0, but you have dill 0.3.7.
botocore 1.32.6 has requirement urllib3<1.27,>=1.25.4; python_version < "3.10", but you have urllib3 2.0.7.

Vulnerabilities that will be fixed

By pinning:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 651/1000
Why? Recently disclosed, Has a fix available, CVSS 7.3
XML External Entity (XXE) Injection
SNYK-PYTHON-SYMPY-6084333
sympy:
1.10.1 -> 1.12
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 XML External Entity (XXE) Injection

The following vulnerabilities are fixed by pinning transitive dependencies:
- https://snyk.io/vuln/SNYK-PYTHON-SYMPY-6084333

Micro-Learning Topic: External entity injection (Detected by phrase)

Matched on "XXE"

What is this? (2min video)

An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server-side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts.

Try a challenge in Secure Code Warrior

Helpful references

This PR has 0 quantified lines of changes. In general, a change size of upto 200 lines is ideal for the best PR experience!


Quantification details

Label      : No Changes
Size       : +0 -0
Percentile : 0%

Total files changed: 1

Change summary by file extension:
.txt : +0 -0

Change counts above are quantified counts, based on the PullRequestQuantifier customizations.

Why proper sizing of changes matters

Optimal pull request sizes drive a better predictable PR flow as they strike a
balance between between PR complexity and PR review overhead. PRs within the
optimal size (typical small, or medium sized PRs) mean:

  • Fast and predictable releases to production:
    • Optimal size changes are more likely to be reviewed faster with fewer
      iterations.
    • Similarity in low PR complexity drives similar review times.
  • Review quality is likely higher as complexity is lower:
    • Bugs are more likely to be detected.
    • Code inconsistencies are more likely to be detected.
  • Knowledge sharing is improved within the participants:
    • Small portions can be assimilated better.
  • Better engineering practices are exercised:
    • Solving big problems by dividing them in well contained, smaller problems.
    • Exercising separation of concerns within the code changes.

What can I do to optimize my changes

  • Use the PullRequestQuantifier to quantify your PR accurately
    • Create a context profile for your repo using the context generator
    • Exclude files that are not necessary to be reviewed or do not increase the review complexity. Example: Autogenerated code, docs, project IDE setting files, binaries, etc. Check out the Excluded section from your prquantifier.yaml context profile.
    • Understand your typical change complexity, drive towards the desired complexity by adjusting the label mapping in your prquantifier.yaml context profile.
    • Only use the labels that matter to you, see context specification to customize your prquantifier.yaml context profile.
  • Change your engineering behaviors
    • For PRs that fall outside of the desired spectrum, review the details and check if:
      • Your PR could be split in smaller, self-contained PRs instead
      • Your PR only solves one particular issue. (For example, don't refactor and code new features in the same PR).

How to interpret the change counts in git diff output

  • One line was added: +1 -0
  • One line was deleted: +0 -1
  • One line was modified: +1 -1 (git diff doesn't know about modified, it will
    interpret that line like one addition plus one deletion)
  • Change percentiles: Change characteristics (addition, deletion, modification)
    of this PR in relation to all other PRs within the repository.


Was this comment helpful? 👍  :ok_hand:  :thumbsdown: (Email)
Customize PullRequestQuantifier for this repository.

Copy link

Unable to locate .performanceTestingBot config file

Copy link

Hi there! 👋 Thanks for opening a PR. 🎉 To get the most out of Senior Dev, please uninstall the app from your organization, then re-install it into your organization. You can uninstall the app here 🚀

Copy link

difflens bot commented Nov 24, 2023

View changes in DiffLens

Copy link

viezly bot commented Nov 24, 2023

Changes preview:

Legend:

👀 Review pull request on Viezly

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants