-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2024-5569 (Low) detected in zipp-3.15.0-py3-none-any.whl #1410
Comments
⛑️ Automatic Remediation will be attempted for this issue. |
zipp has been changed to 3.19.1 in this PR already. |
Changing zipp in opensearch-build has nothing to do with ccr repo using older zipp version |
Apparently ccr repo is having build repo as dependency, so might be: |
Already fixed in opensearch-project/opensearch-build#4832 |
CVE-2024-5569 - Low Severity Vulnerability
Backport of pathlib-compatible object wrapper for zip files
Library home page: https://files.pythonhosted.org/packages/5b/fa/c9e82bbe1af6266adf08afb563905eb87cab83fde00a0a08963510621047/zipp-3.15.0-py3-none-any.whl
Path to dependency file: /perf_workflow/requirements.txt
Path to vulnerable library: /perf_workflow/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 2da20341107bfe707487d93d271df70aed31356d
Found in base branch: main
A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the
Path
module in both zipp and zipfile, such asjoinpath
, the overloaded division operator, anditerdir
. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp.Publish Date: 2024-07-09
URL: CVE-2024-5569
Base Score Metrics:
Type: Upgrade version
Origin: https://huntr.com/bounties/be898306-11f9-46b4-b28c-f4c4aa4ffbae
Release Date: 2024-07-09
Fix Resolution: 3.19.1
The text was updated successfully, but these errors were encountered: