Skip to content

Commit 2296d81

Browse files
committed
Ignore gdal vulnerability and django upgrades
1 parent 81ade5c commit 2296d81

File tree

2 files changed

+21
-7
lines changed

2 files changed

+21
-7
lines changed

docker/app/run_tests.sh

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,25 @@ else
3434
fi
3535

3636
# Ignore vulnerability found in gdal version 3.6.2
37-
# @TODO Remove this once the base image includes GDAL>=3.8.0
37+
# @TODO Remove these once the base image includes GDAL>=3.8.0
3838
# Vulnerability ID: 62283
39-
# Affected spec: <3.8.0
40-
# ADVISORY: Gdal 3.8.0 backports a security fix for CVE-2023-45853: MiniZip
41-
# in zlib through 1.3 has an integer overflow.
39+
# Affected spec: <3.8.0
40+
# ADVISORY: Gdal 3.8.0 backports a security fix for CVE-2023-45853: MiniZip
41+
# in zlib through 1.3 has an integer overflow.
42+
# Vulnerability ID: 74054
43+
# Affected spec: <3.9.3
44+
# ADVISORY: Affected versions of GDAL's GMLAS driver are vulnerable
45+
# to XML Entity Expansion attacks (Billion Laughs attack). This
46+
# vulnerability can lead to a Denial of Service (DoS) by causing excessive
47+
# resource consumption when parsing specially crafted XML files with
48+
# recursive entity definitions. The attack vector involves feeding malicious
49+
# XML content to the GMLAS driver, exploiting the unlimited entity expansion
50+
# during parsing. The vulnerability exists in the GMLASReader class's XML
51+
# parsing functions that lack restrictions on entity expansion. An attacker
52+
# can exploit this by providing a crafted XML input to any application using
53+
# the vulnerable GMLAS driver, potentially rendering the application
54+
# unresponsive. The issue is mitigated by introducing a limit on entity
55+
# expansions and aborting parsing when the limit is exceeded.
4256

4357
# Ignore vulnerability found in jinja2 version 3.1.4
4458
# We do not allow any untrusted templates, and so are not affected.
@@ -51,9 +65,9 @@ fi
5165
# third parties believe that this vulnerability isn't valid because users
5266
# shouldn't use untrusted templates without sandboxing.
5367
# CVE-2019-8341
54-
68+
5569
echo Package Vulnerabilities:
56-
pip freeze | safety check --stdin --full-report -i 62283 -i 70612
70+
pip freeze | safety check --stdin --full-report -i 62283 -i 70612 -i 74054
5771
SAFETY_RESULT=$?
5872

5973
# Suppress SAFETY_RESULT unless CHECK_SAFETY is set

requirements/base.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ dagster-pipes==1.6.8
55
dagster-postgres==0.22.8
66
dagster-webserver==1.6.8
77
ddtrace==2.6.2
8-
Django==5.1.1
8+
Django==5.1.4
99
django-binary-database-files==1.0.18
1010
django-environ==0.11.2
1111
django-extensions==3.2.3

0 commit comments

Comments
 (0)