Source: python-urllib3
Version: 2.5.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-urllib3.

CVE-2025-66471[0]:
| urllib3 is a user-friendly HTTP client library for Python. Starting
| in version 1.0 and prior to 2.6.0, the Streaming API improperly
| handles highly compressed data. urllib3's streaming API is designed
| for the efficient handling of large HTTP responses by reading the
| content in chunks, rather than loading the entire response body into
| memory at once. When streaming a compressed response, urllib3 can
| perform decoding or decompression based on the HTTP Content-Encoding
| header (e.g., gzip, deflate, br, or zstd). The library must read
| compressed data from the network and decompress it until the
| requested chunk size is met. Any resulting decompressed data that
| exceeds the requested amount is held in an internal buffer for the
| next read operation. The decompression logic could cause urllib3 to
| fully decode a small amount of highly compressed data in a single
| operation. This can result in excessive resource consumption (high
| CPU usage and massive memory allocation for the decompressed data.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-66471
    https://www.cve.org/CVERecord?id=CVE-2025-66471
[1] https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to