Your message dated Fri, 06 Feb 2026 01:05:07 +0000
with message-id <[email protected]>
and subject line Bug#1122029: fixed in python-urllib3 2.6.3-1
has caused the Debian Bug report #1122029,
regarding python-urllib3: CVE-2025-66471
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1122029: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122029
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: python-urllib3
Version: 2.5.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi,
The following vulnerability was published for python-urllib3.
CVE-2025-66471[0]:
| urllib3 is a user-friendly HTTP client library for Python. Starting
| in version 1.0 and prior to 2.6.0, the Streaming API improperly
| handles highly compressed data. urllib3's streaming API is designed
| for the efficient handling of large HTTP responses by reading the
| content in chunks, rather than loading the entire response body into
| memory at once. When streaming a compressed response, urllib3 can
| perform decoding or decompression based on the HTTP Content-Encoding
| header (e.g., gzip, deflate, br, or zstd). The library must read
| compressed data from the network and decompress it until the
| requested chunk size is met. Any resulting decompressed data that
| exceeds the requested amount is held in an internal buffer for the
| next read operation. The decompression logic could cause urllib3 to
| fully decode a small amount of highly compressed data in a single
| operation. This can result in excessive resource consumption (high
| CPU usage and massive memory allocation for the decompressed data.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-66471
https://www.cve.org/CVERecord?id=CVE-2025-66471
[1] https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: python-urllib3
Source-Version: 2.6.3-1
Done: Colin Watson <[email protected]>
We believe that the bug you reported is fixed in the latest version of
python-urllib3, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Colin Watson <[email protected]> (supplier of updated python-urllib3 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 06 Feb 2026 00:37:49 +0000
Source: python-urllib3
Architecture: source
Version: 2.6.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team <[email protected]>
Changed-By: Colin Watson <[email protected]>
Closes: 1122029 1122743
Changes:
python-urllib3 (2.6.3-1) unstable; urgency=medium
.
* Team upload.
* New upstream release:
- CVE-2025-66471: Fixed a security issue where streaming API could
improperly handle highly compressed HTTP content ("decompression
bombs") leading to excessive resource consumption even when a small
amount of data was requested. Reading small chunks of compressed data
is safer and much more efficient now (closes: #1122029).
- Fixed HTTPResponse.read_chunked() to properly handle leftover data in
the decoder's buffer when reading compressed chunked responses
(closes: #1122743).
* Bump Build-Depends/Suggests on python3-brotli to >= 1.2.0 to improve the
fix for CVE-2025-66418.
Checksums-Sha1:
d5e3ad6373360c72f77d74cf9a0c32e1dd16c6ea 2962 python-urllib3_2.6.3-1.dsc
31cb9b89e7b94424580b1d80d4459d36ba7b52c2 435556
python-urllib3_2.6.3.orig.tar.gz
d7daa88d40df10aabbb20fcbe1e24ae1c8a39b73 38172
python-urllib3_2.6.3-1.debian.tar.xz
Checksums-Sha256:
421ea1b5674fbc0580bb159856a6ea81224f58dce6c98d305549d98b61a34a67 2962
python-urllib3_2.6.3-1.dsc
1b62b6884944a57dbe321509ab94fd4d3b307075e0c2eae991ac71ee15ad38ed 435556
python-urllib3_2.6.3.orig.tar.gz
f4de7d8e6cfc6b6141b22ed1bee7f143d6f1b5150bd8ad4e77280d66d17ee4ac 38172
python-urllib3_2.6.3-1.debian.tar.xz
Files:
f7ee52094ad0e63c20275c8fe55eb7f4 2962 python optional
python-urllib3_2.6.3-1.dsc
2c381874816fe551f50a2551abae62b3 435556 python optional
python-urllib3_2.6.3.orig.tar.gz
bf11c7414e82546a8ed9b58c293ca74e 38172 python optional
python-urllib3_2.6.3-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=DrGi
-----END PGP SIGNATURE-----
pgp4J63e1j17f.pgp
Description: PGP signature
--- End Message ---