Release: Merge back 2.49.3 into dev from: master-into-dev/2.49.3-2.50.0-dev#13043
Merged
Release: Merge back 2.49.3 into dev from: master-into-dev/2.49.3-2.50.0-dev#13043
Conversation
….50.0-dev Release: Merge back 2.49.2 into bugfix from: master-into-bugfix/2.49.2-2.50.0-dev
Bumps and [brace-expansion](https://github.com/juliangruber/brace-expansion). These dependencies needed to be updated together. Updates `brace-expansion` from 1.1.11 to 1.1.12 - [Release notes](https://github.com/juliangruber/brace-expansion/releases) - [Commits](juliangruber/brace-expansion@1.1.11...v1.1.12) Updates `brace-expansion` from 2.0.1 to 2.0.2 - [Release notes](https://github.com/juliangruber/brace-expansion/releases) - [Commits](juliangruber/brace-expansion@1.1.11...v1.1.12) --- updated-dependencies: - dependency-name: brace-expansion dependency-version: 1.1.12 dependency-type: indirect - dependency-name: brace-expansion dependency-version: 2.0.2 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* BlackDuck: Support import in plaintext or bytes * Normalize unit test to look like the others
[docs] update Priority & Risk docs
mend: fix handling known_exploited/ransomware_used
Release: Merge release into master from: release/2.49.3
Contributor
Author
|
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Contributor
Author
|
Conflicts have been resolved. A maintainer will review the pull request shortly. |
|
This pull request contains a potential uncontrolled resource consumption vulnerability in the zip file processing logic, where an attacker could potentially create a malicious zip file that could cause a Denial of Service by overwhelming system resources, though the current risk is assessed as passing and non-blocking.
Uncontrolled Resource Consumption (Zip Bomb) in
|
| Vulnerability | Uncontrolled Resource Consumption (Zip Bomb) |
|---|---|
| Description | The code processes zip files without implementing checks for the uncompressed size of files or the total number of files within the archive. This allows an attacker to craft a malicious zip file (a 'zip bomb') that, when processed, could lead to excessive memory consumption or CPU usage, resulting in a Denial of Service (DoS) for the application. |
django-DefectDojo/dojo/tools/blackduck_component_risk/importer.py
Lines 42 to 48 in ddb34aa
All finding details can be found in the DryRun Security Dashboard.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Release triggered by
rossops