-
Notifications
You must be signed in to change notification settings - Fork 0
chore(deps): update dependency zipp to v3.19.1 [security] #19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop-ng
Are you sure you want to change the base?
Conversation
Branch automerge failureThis PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead. |
Welcome @renovate[bot]! 🎉Great PR! I've analyzed your code changes for:
Ready to see the full review?
Let's make your code even better together! 🚀 |
|
By default, I don't review pull requests opened by bots. If you would like me to review this pull request anyway, you can request a review via the |
|
Important Review skippedBot user detected. To trigger a single review, invoke the You can disable this status message by setting the 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Join our Discord community for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
Reviewer's Guide by SourceryThis PR updates the zipp dependency from version 3.17.0 to 3.19.1 to address a Denial of Service vulnerability (CVE-2024-5569). Sequence diagram showing the DoS vulnerability in zipp < 3.19.1sequenceDiagram
participant A as Attacker
participant Z as Zipp Library
participant App as Application
A->>Z: Send malicious zip file
activate Z
Z->>Z: Process zip file with Path operations
Note over Z: Infinite loop in joinpath,<br/>division operator, or iterdir
Z-->>App: No response
deactivate Z
Note over App: Application becomes<br/>unresponsive
State diagram showing zipp library behavior before and after updatestateDiagram-v2
direction LR
state "Zipp v3.17.0" as old {
[*] --> Processing
Processing --> InfiniteLoop: Malicious zip file
InfiniteLoop --> InfiniteLoop: Stuck
}
state "Zipp v3.19.1" as new {
[*] --> Processing2
Processing2 --> Complete: Malicious zip file
Complete --> [*]
}
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have skipped reviewing this pull request. Here's why:
- It seems to have been created by a bot (hey, renovate[bot]!). We assume it knows what it's doing!
- We don't review packaging changes - Let us know if you'd like us to change this.
|
Here's the code health analysis summary for commits Analysis Summary
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
PR Summary
This PR updates the zipp dependency in docs/requirements.txt from 3.17.0 to 3.19.1 to address a critical security vulnerability (CVE-2024-5569) that could enable denial-of-service attacks through maliciously crafted zip files.
- Updates
zipp==3.19.1indocs/requirements.txtto patch CVE-2024-5569 which prevents infinite loops when processing specially crafted zip files - Vulnerability affects Path module operations like
joinpath, division operator, anditerdirin both zipp and CPython's zipfile module - Maintains existing Python version constraints (>= 3.8 and < 3.10)
- Security update is backwards compatible with no breaking changes reported
💡 (4/5) You can add custom instructions or style guidelines for the bot here!
1 file(s) reviewed, no comment(s)
Edit PR Review Bot Settings | Greptile
588250a to
3f420ac
Compare
f62b185 to
68ff8b9
Compare
68ff8b9 to
1f02f2d
Compare
🎉 Snyk checks have passed. No issues have been found so far.✅ security/snyk check is complete. No issues have been found. (View Details) |
Code Review Agent Run #786643Actionable Suggestions - 0Review Details
|
Changelist by BitoThis pull request implements the following key changes.
|
|
|
1f02f2d to
ff82787
Compare
Code Review Agent Run #945a47Actionable Suggestions - 0Review Details
|
ff82787 to
28c24f0
Compare

This PR contains the following updates:
==3.17.0→==3.19.1GitHub Vulnerability Alerts
CVE-2024-5569
A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the
Pathmodule in both zipp and zipfile, such asjoinpath, the overloaded division operator, anditerdir. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp.Release Notes
jaraco/zipp (zipp)
v3.19.1Compare Source
v3.19.0Compare Source
v3.18.2Compare Source
v3.18.1Compare Source
v3.18.0Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.