bump pyOpenSSL and snowflake-connector-python versions#7783
Merged
eastandwestwind merged 3 commits intomainfrom Mar 30, 2026
Merged
bump pyOpenSSL and snowflake-connector-python versions#7783eastandwestwind merged 3 commits intomainfrom
eastandwestwind merged 3 commits intomainfrom
Conversation
Contributor
|
The latest updates on your projects. Learn more about Vercel for GitHub. 2 Skipped Deployments
|
Dependency ReviewThe following issues were found:
Snapshot WarningsEnsure that dependencies are being submitted on PR branches and consider enabling retry-on-snapshot-warnings. See the documentation for more information and troubleshooting advice. Scanned Files
|
There was a problem hiding this comment.
Code Review
This is a minimal, well-scoped security patch. No critical issues found.
Summary
The two-line change in pyproject.toml correctly addresses two pyOpenSSL CVEs (one High, one Low) by bumping to pyOpenSSL~=26.0.0 and pulling snowflake-connector-python up to ~=4.4.0 to unblock the pyOpenSSL upper-bound that 4.3.x enforced.
Compatibility check passes:
pyOpenSSL 26.xrequirescryptography>=44.0.0; the existingcryptography~=46.0.5pin satisfies that with room to spare.- No direct
import OpenSSLusage exists anywhere in the fides Python source — pyOpenSSL is consumed only transitively, so no API-level breakage is possible from this side of the code. - The
~=26.0.0compatible-release specifier (>=26.0.0, <26.1) follows the same pinning pattern already used throughoutpyproject.toml, which is appropriate for security patches.
Suggestions
- The PR description mentions "Neither vulnerable callback API is used in fides or fidesplus" — it would be worth a brief note confirming the same for the Snowflake connector, since that connector does do more complex SSL/TLS negotiation. A quick grep of
src/fides/api/service/connectors/snowflake_connector.pyfor any custom SSL callback usage before merge would close that loop. (Low priority — the snowflake-connector-python library encapsulates this internally, so fides code is very unlikely to be affected.)
Nice to Have
- The
CHANGELOG.mdchecklist item is unchecked. If the team convention requires an entry for security dependency bumps, it's worth adding one before merge to maintain release note completeness.
Overall this is a clean, low-risk security fix. ✓
erosselli
approved these changes
Mar 30, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Ticket https://ethyca.atlassian.net/browse/ENG-3020
Description Of Changes
Bumps pyOpenSSL to 26.0.0 to fix CVE-2026-27459 (High) and CVE-2026-27448 (Low). Bumps snowflake-connector-python to 4.4.0 for compatibility, since 4.3.x capped pyOpenSSL below 26. Neither vulnerable callback API is used in fides or fidesplus, so practical risk is very low.
CVEs:
GHSA-5pwr-322w-8jr4 (High) — DTLS cookie callback buffer overflow
GHSA-vp96-hxj8-p424 (Low) — TLS connection bypass via unhandled callback exception
Code Changes
Steps to Confirm
Pre-Merge Checklist
CHANGELOG.mdupdatedmaindowngrade()migration is correct and works