fix(deps): upgrade urllib3 to 2.7.0 to address CVE-2026-44432#2960
Draft
Copilot wants to merge 3 commits into
Draft
fix(deps): upgrade urllib3 to 2.7.0 to address CVE-2026-44432#2960Copilot wants to merge 3 commits into
Copilot wants to merge 3 commits into
Conversation
…xr-j63j) Agent-Logs-Url: https://github.com/open-telemetry/otel-arrow/sessions/c29c04d2-2125-47bf-a555-82dfdc6c19c2 Co-authored-by: reyang <17327289+reyang@users.noreply.github.com>
… path Agent-Logs-Url: https://github.com/open-telemetry/otel-arrow/sessions/c29c04d2-2125-47bf-a555-82dfdc6c19c2 Co-authored-by: reyang <17327289+reyang@users.noreply.github.com>
Copilot
AI
changed the title
[WIP] Fix urllib3 decompression-bomb safeguards bypassed in streaming API
fix(deps): upgrade urllib3 to 2.7.0 to address CVE-2026-44432
May 13, 2026
reyang
reviewed
May 13, 2026
| --hash=sha256:f12b1a9e332c01e09510586f8ca9b108fd631fd656af82e452d7315ef6df5f9f \ | ||
| --hash=sha256:f4753e73e34c8d83221ba58f232433fca2748be8b18dbca02d242ed153945043 \ | ||
| --hash=sha256:f8d68083e49e16b84734eb1a4dcae4259a75c90fb6e2251ab9a00b61120c06ab | ||
| # via -r tools/pipeline_perf_test/orchestrator/requirements.txt |
Member
There was a problem hiding this comment.
Why making this change? Seems irrelevant to what the PR title suggested.
Also, is this a duplicate of #2961?
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #2960 +/- ##
=======================================
Coverage 86.03% 86.03%
=======================================
Files 720 720
Lines 273264 273264
=======================================
+ Hits 235095 235098 +3
+ Misses 37645 37642 -3
Partials 524 524
🚀 New features to boost your workflow:
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps urllib3 from 2.6.3 → 2.7.0 in the pipeline perf test orchestrator to address GHSA-mf9v-mfxr-j63j / CVE-2026-44432: decompression-bomb safeguards bypassed in the streaming API (
HTTPResponse.read(amt=N)with Brotli, andHTTPResponse.drain_conn()after partial decompression).Change Summary
requirements.txt: added expliciturllib3>=2.7.0security pin (urllib3 is otherwise an unpinned transitive dep ofrequests,docker, andkubernetes)requirements.lock.txt: regenerated viapip-compile --generate-hashesto lock urllib3 at 2.7.0Reachability: not reachable (high confidence). The orchestrator uses the high-level
requestsAPI and never callsHTTPResponse.drain_conn()or the raw streamingHTTPResponse.read(amt=N)directly. This update satisfies vulnerability scanners as a defense-in-depth measure.How are these changes tested?
No functional changes; dependency version bump only. Verified the lock file resolves
urllib3==2.7.0.Are there any user-facing changes?
No.
Original prompt
This section details the Dependabot vulnerability alert you should resolve
<alert_title>urllib3: Decompression-bomb safeguards bypassed in parts of the streaming API</alert_title>
<alert_description>### Impact
urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once.
urllib3 can perform decompression based on the HTTP
Content-Encodingheader (e.g.,gzip,deflate,br, orzstd). When using the streaming API since version 2.6.0, the library decompresses only the necessary bytes, enabling partial content consumption.However, urllib3 before version 2.7.0 could still decompress the whole response instead of the requested portion in two cases:
HTTPResponse.read(amt=N)call when the response was decompressed using the official Brotli library.HTTPResponse.drain_conn()was called after the response had been read and decompressed partially (compression algorithm did not matter here).These issues could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This could result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data; CWE-409) on the client side.
Affected usages
Applications and libraries using urllib3 versions earlier than 2.7.0 may be affected when streaming compressed responses from untrusted sources in either of these cases, unless decompression is explicitly disabled:
bris read incrementally with at least twoHTTPResponse.read(amt=N)orHTTPResponse.stream(amt=N)calls while using the official Brotli library.HTTPResponse.drain_conn()is called after response decompression has already started.Remediation
Upgrade to at least urllib3 version 2.7.0 in which the library:
HTTPResponse.drain_conn().If upgrading is not immediately possible, the following workarounds may reduce exposure in specific cases:
output_buffer_limitis not fully respected google/brotli#1396.HTTPResponse.drain_conn(), callHTTPResponse.close()instead when connection reuse is not important.Credits
The Brotli-specific issue was reported by @kimkou2024.
HTTPResponse.drain_conn()inefficiency was reported by @Cycloctane.</alert_description>high
https://github.com/urllib3/urllib3/security/advisories/GHSA-mf9v-mfxr-j63j https://github.com/advisories/GHSA-mf9v-mfxr-j63jGHSA-mf9v-mfxr-j63j, CVE-2026-44432
urllib3
pip
<vulnerable_versions>= 2.6.3</vulnerable_versions>
<patched_version>2.7.0</patched_version>
<manifest_path>tools/pipeline_perf_test/orchestrator/requirements.txt</manifest_path>
<task_instructions>Resolve this alert by updating the affected package to a non-vulnerable version. Prefer the lowest non-vulnerable version (see the patched_version field above) over the latest to minimize breaking changes. Include a Reachability Assessment section in the PR description. Review the alert_description field to understand which APIs, features, or configurations are affected, then search the codebase for usage of those specific items. If the vulnerable code path is reachable, explain how (which files, APIs, or call sites use the affected functionality) and note that the codebase is actively exposed to this vulnerability. If the vulnerable code path is not reachable, explain why (e.g. the affected API is never called, the vulnerable configuration is not used) and note that the update is primarily to satisfy vulnerability scanners rather than to address an active risk. If the advisory is too vague to determine reachability (e.g. 'improper input validation' with no specific API named), state that reachability could not be determined and explain why. Include a confidence level in the reachability assessment (e.g. high confidence if the advisory names a specific API and you confirmed it is or is not called, low confidence if the usage is indirect and hard to trace). If no patched version is available, check the alert_description field for a Workarounds section — the advisory may describe configuration changes or usage patterns that mitigate the vulnerability without a version update. If a workaround is available, apply it and leave a code comment referencing the advisory identifier explain...
round_robinby default #32