Skip to content

[GHSA-crjg-w57m-rqqf] DNSJava vulnerable to KeyTrap - Denial-of-Service Algorithmic Complexity Attacks #4580

[GHSA-crjg-w57m-rqqf] DNSJava vulnerable to KeyTrap - Denial-of-Service Algorithmic Complexity Attacks

[GHSA-crjg-w57m-rqqf] DNSJava vulnerable to KeyTrap - Denial-of-Service Algorithmic Complexity Attacks #4580

Triggered via pull request September 11, 2024 07:25
@amita-sealamita-seal
opened #4787
Status Success
Total duration 1m 9s
Artifacts

create_staging_branch.yaml

on: pull_request_target
ensure-base-is-staging
59s
ensure-base-is-staging
Fit to window
Zoom out
Zoom in

Annotations

2 warnings
ensure-base-is-staging
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
ensure-base-is-staging
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/checkout@v2. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/