-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency sqlparse to v0.5.0 [security] #5356
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/pypi-sqlparse-vulnerability
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
2 times, most recently
from
February 6, 2024 16:16
e223633
to
53048fb
Compare
renovate
bot
changed the title
chore(deps): update dependency sqlparse to v0.4.4 [security]
Update dependency sqlparse to v0.4.4 [SECURITY]
Feb 6, 2024
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
3 times, most recently
from
March 6, 2024 13:53
996dc4a
to
2f3c364
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
2 times, most recently
from
March 26, 2024 12:43
1635c10
to
42290ad
Compare
renovate
bot
changed the title
Update dependency sqlparse to v0.4.4 [SECURITY]
chore(deps): update dependency sqlparse to v0.4.4 [security]
Mar 26, 2024
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
March 26, 2024 14:37
42290ad
to
2365ea0
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
April 2, 2024 15:06
2365ea0
to
49b8b17
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
2 times, most recently
from
April 16, 2024 23:33
444231d
to
416245f
Compare
renovate
bot
changed the title
chore(deps): update dependency sqlparse to v0.4.4 [security]
chore(deps): update dependency sqlparse to v0.5.0 [security]
Apr 16, 2024
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
3 times, most recently
from
April 22, 2024 08:47
fc0901d
to
517fd2f
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
2 times, most recently
from
April 25, 2024 18:07
ab6a0ec
to
bbc3865
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
May 3, 2024 15:46
bbc3865
to
1d2f90c
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
2 times, most recently
from
May 20, 2024 19:53
881e9ed
to
4e89574
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
May 28, 2024 20:06
4e89574
to
b35c13a
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
2 times, most recently
from
June 17, 2024 15:12
9cb3d7a
to
7980c2c
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
August 6, 2024 09:41
7980c2c
to
7639492
Compare
renovate
bot
changed the title
chore(deps): update dependency sqlparse to v0.5.0 [security]
chore(deps): update dependency sqlparse to v0.4.4 [security]
Aug 6, 2024
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
September 20, 2024 15:36
7639492
to
4e0c890
Compare
renovate
bot
changed the title
chore(deps): update dependency sqlparse to v0.4.4 [security]
chore(deps): update dependency sqlparse to v0.5.0 [security]
Sep 20, 2024
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
October 3, 2024 12:46
4e0c890
to
da17b04
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
2 times, most recently
from
October 7, 2024 19:19
38c2110
to
dc56d5a
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
October 17, 2024 14:05
dc56d5a
to
14e8bc1
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
October 25, 2024 12:21
14e8bc1
to
c3111d0
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
3 times, most recently
from
November 25, 2024 15:53
56e77f6
to
143e9fe
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
2 times, most recently
from
December 10, 2024 01:09
0253df9
to
4991e64
Compare
renovate
bot
force-pushed
the
renovate/pypi-sqlparse-vulnerability
branch
from
December 10, 2024 19:04
4991e64
to
017c0cc
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
None yet
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==0.3.0
->==0.5.0
GitHub Vulnerability Alerts
CVE-2023-30608
Impact
The SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). The vulnerability may lead to Denial of Service (DoS).
Patches
This issues has been fixed in sqlparse 0.4.4.
Workarounds
None.
References
This issue was discovered and reported by GHSL team member @erik-krogh (Erik Krogh Kristensen).
CVE-2024-4340
Summary
Passing a heavily nested list to sqlparse.parse() leads to a Denial of Service due to RecursionError.
Details + PoC
Running the following code will raise Maximum recursion limit exceeded exception:
We expect a traceback of RecursionError:
Fix suggestion
The flatten() function of TokenList class should limit the recursion to a maximal depth:
Impact
Denial of Service (the impact depends on the use).
Anyone parsing a user input with sqlparse.parse() is affected.
Release Notes
andialbrecht/sqlparse (sqlparse)
v0.5.0
Compare Source
Notable Changes
error for deeply nested statements. Instead of recursion error a generic
SQLParseError is raised. See the security advisory for details:
GHSA-2m57-hf25-phgg
The vulnerability was discovered by @uriyay-jfrog. Thanks for reporting!
Enhancements:
Some database backends love statements without semicolon (issue742).
Bug Fixes
by josuc1, thanks for bringing this up!).
Other
v0.4.4
Compare Source
Notable Changes
parser where a regular expression vulnerable to ReDOS (Regular
Expression Denial of Service) was used. See the security advisory
for details: GHSA-rrm6-wvj7-cwh2
The vulnerability was discovered by @erik-krogh from GitHub
Security Lab (GHSL). Thanks for reporting!
Bug Fixes
The primary expectation is that IN is treated as a keyword and not as a
comparison operator. That also follows the definition of reserved keywords
for the major SQL syntax definitions.
Other
v0.4.3
Compare Source
Enhancements
Bug Fixes
Other
v0.4.2
Compare Source
Notable Changes
strip comments filter. In this filter a regular expression that was
vulnerable to ReDOS (Regular Expression Denial of Service) was
used. See the security advisory for details: GHSA-p5w8-wqhj-9hhf
The vulnerability was discovered by @erik-krogh and @yoff from
GitHub Security Lab (GHSL). Thanks for reporting!
Enhancements
Bug Fixes
v0.4.1
Compare Source
Bug Fixes
v0.4.0
Compare Source
Notable Changes
required.
statements anymore. Code that ignored the last element from
sqlparse.split() should be updated accordingly since that function
now doesn't return an empty string as the last element in some
cases (issue496).
Enhancements
Bug Fixes
v0.3.1
Compare Source
Enhancements
Bug Fixes
parentheses (issue485, pr486 by win39).
identifiers (issue491).
0.3.0 (issue456) as it had some side-effects with other dialects and
doesn't seem to be widely used (issue476).
have an alias (issue455, adopted some parts of pr509 by john-bodley).
Configuration
📅 Schedule: Branch creation - "" in timezone US/Eastern, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.