fix(deps): upgrade Pygments 2.19.2 → 2.20.0 (CVE-2026-4539)#21
fix(deps): upgrade Pygments 2.19.2 → 2.20.0 (CVE-2026-4539)#21hyunhee-jo merged 1 commit intomainfrom
Conversation
Fixes Dependabot alert #13: ReDoS via inefficient regex in AdlLexer. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
|
Important Review skippedReview was skipped due to path filters ⛔ Files ignored due to path filters (1)
CodeRabbit blocks several paths by default. You can override this behavior by explicitly including those paths in the path filters. For example, including ⚙️ Run configurationConfiguration used: Organization UI Review profile: ASSERTIVE Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
PR Review: fix(deps): upgrade Pygments 2.19.2 → 2.20.0 (CVE-2026-4539)Overall: Approve with minor notes This is a clean, well-scoped security patch. The approach is correct and the changes are minimal. What's done well
Minor notes
Security assessmentThe CVE (ReDoS in Summary: Merge once CI is green. No blocking issues. |
Objective
Dependabot alert #13 reports a ReDoS vulnerability (CVE-2026-4539) in Pygments < 2.20.0.
The inefficient regex in
AdlLexerallows local denial-of-service via crafted input.Fixes opendataloader-project/langchain-opendataloader-pdf Dependabot #13
Approach
Run
uv lock --upgrade-package pygmentsto bump the transitive dependencyfrom 2.19.2 to 2.20.0 — Pygments is not a direct dependency (pulled in via pytest),
so only
uv.lockchanges. No source code modification needed.Evidence
Cannot reproduce the ReDoS locally — the vulnerability is in an Archetype lexer
(
AdlLexer) that this project does not invoke. Evidence is limited to CI verification: