GuardDog is a CLI tool to identify malicious PyPI packages. Prior to 2.7.1, GuardDog's safe_extract() function does not validate decompressed file sizes when extracting ZIP archives (wheels, eggs), allowing attackers to cause denial of service through zip bombs. A malicious package can consume gigabytes of disk space from a few megabytes of compressed data. This vulnerability is fixed in 2.7.1.
References
| Link | Resource |
|---|---|
| https://github.com/DataDog/guarddog/commit/c3fb07b4838945f42497e78b7a02bcfb1e63969b | Patch |
| https://github.com/DataDog/guarddog/security/advisories/GHSA-ffj4-jq7m-9g6v | Third Party Advisory Exploit |
Configurations
History
No history.
Information
Published : 2026-01-13 21:15
Updated : 2026-01-21 18:47
NVD link : CVE-2026-22870
Mitre link : CVE-2026-22870
CVE.ORG link : CVE-2026-22870
JSON object : View
Products Affected
datadoghq
- guarddog
CWE
CWE-409
Improper Handling of Highly Compressed Data (Data Amplification)
