Source: python-urllib3 Version: 2.5.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for python-urllib3. CVE-2025-66471[0]: | urllib3 is a user-friendly HTTP client library for Python. Starting | in version 1.0 and prior to 2.6.0, the Streaming API improperly | handles highly compressed data. urllib3's streaming API is designed | for the efficient handling of large HTTP responses by reading the | content in chunks, rather than loading the entire response body into | memory at once. When streaming a compressed response, urllib3 can | perform decoding or decompression based on the HTTP Content-Encoding | header (e.g., gzip, deflate, br, or zstd). The library must read | compressed data from the network and decompress it until the | requested chunk size is met. Any resulting decompressed data that | exceeds the requested amount is held in an internal buffer for the | next read operation. The decompression logic could cause urllib3 to | fully decode a small amount of highly compressed data in a single | operation. This can result in excessive resource consumption (high | CPU usage and massive memory allocation for the decompressed data. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-66471 https://www.cve.org/CVERecord?id=CVE-2025-66471 [1] https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

