Open
Conversation
Bumps [gdown](https://github.com/wkentaro/gdown) from 5.2.0 to 5.2.2. - [Release notes](https://github.com/wkentaro/gdown/releases) - [Commits](wkentaro/gdown@v5.2.0...v5.2.2) --- updated-dependencies: - dependency-name: gdown dependency-version: 5.2.2 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #710 +/- ##
=======================================
Coverage 74.40% 74.40%
=======================================
Files 56 56
Lines 8026 8026
Branches 1570 1570
=======================================
Hits 5972 5972
Misses 1437 1437
Partials 617 617
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps gdown from 5.2.0 to 5.2.2.
Release notes
Sourced from gdown's releases.
Commits
af569fcfix: prevent path traversal in archive extraction and filename handling7f4cb68Merge pull request #417 from wkentaro/fix_cached_download_verify_file_hash_be...9697a53fix(cached_download): verify file hash before moving to final locationc7c1b9dMerge pull request #407 from wkentaro/fix_speed_limit940bd40Fix throttling logic to use independent byte counter instead ofpbar.na55ce67Fix unnecessary sleep when resuming downloads with speed limitc3c8102Merge pull request #398 from hmaarrfk/linta095aaachore: add missing space for help of --output10e8c85lint other filesDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.
Greptile Summary
This PR bumps
gdownfrom 5.2.0 to 5.2.2 in theexampleextras group. The upgrade carries security fixes for a path traversal vulnerability inextractall()(GHSA-76hw-p97h-883f) and filename sanitization improvements. Theuv.lockalso gains arevision = 3marker andupload-timemetadata on all package entries, reflecting a uv lock-format update alongside the dependency change.Confidence Score: 5/5
Safe to merge — this is a security patch update with no breaking changes.
The only functional change is a two-patch-version bump of gdown that addresses a known path traversal CVE (GHSA-76hw-p97h-883f). The lock file hashes are consistent, and the update is scoped to the optional
exampleextras group, so it has no impact on the core library or test dependencies.No files require special attention.
Important Files Changed
gdown==5.2.0togdown==5.2.2in theexampleextras group — straightforward and correct.revision = 3added andupload-timemetadata appended to all package entries as part of a uv lock-format update.Flowchart
%%{init: {'theme': 'neutral'}}%% flowchart TD A[pyproject.toml\nexample extras] -->|gdown==5.2.0 → 5.2.2| B[uv.lock updated\nrevision 3 + upload-time metadata] B --> C{Security fixes in 5.2.2} C --> D[Path traversal fix\nGHSA-76hw-p97h-883f] C --> E[Symlink/hardlink rejection\nin tar archives] C --> F[Filename sanitization\nfrom HTTP responses] C --> G[Hash verified before\nfile move - 5.2.1 fix]Reviews (1): Last reviewed commit: "Bump gdown from 5.2.0 to 5.2.2" | Re-trigger Greptile