| Package | Installed | Affected | Info |
|---|---|---|---|
| urllib3 | 2.5.0 | >=1.22,<2.6.3 |
show Affected versions of the urllib3 package are vulnerable to Denial of Service (DoS) due to redirect handling that drains connections by decompressing redirect response bodies without enforcing streaming read limits. The issue occurs when using urllib3’s streaming mode (for example, preload_content=False) while allowing redirects, because urllib3.response.HTTPResponse.drain_conn() would call HTTPResponse.read() in a way that decoded/decompressed the entire redirect response body even before any streaming reads were performed, effectively bypassing decompression-bomb safeguards. |
| urllib3 | 2.5.0 | >=1.0,<2.6.0 |
show Affected versions of the urllib3 package are vulnerable to Denial of Service (DoS) due to improper handling of highly compressed HTTP response bodies during streaming decompression. The urllib3.HTTPResponse methods stream(), read(), read1(), read_chunked(), and readinto() may fully decompress a minimal but highly compressed payload based on the Content-Encoding header into an internal buffer instead of limiting the decompressed output to the requested chunk size, causing excessive CPU usage and massive memory allocation on the client side. |
| urllib3 | 2.5.0 | >=1.24,<2.6.0 |
show Affected versions of the urllib3 package are vulnerable to Denial of Service (DoS) due to allowing an unbounded number of content-encoding decompression steps for HTTP responses. The HTTPResponse content decoding pipeline in urllib3 follows the Content-Encoding header and applies each advertised compression algorithm in sequence without enforcing a maximum chain length or effective output size, so a malicious peer can send a response with a very long encoding chain that triggers excessive CPU use and massive memory allocation during decompression. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| urllib3 | 2.5.0 | >=1.22,<2.6.3 |
show Affected versions of the urllib3 package are vulnerable to Denial of Service (DoS) due to redirect handling that drains connections by decompressing redirect response bodies without enforcing streaming read limits. The issue occurs when using urllib3’s streaming mode (for example, preload_content=False) while allowing redirects, because urllib3.response.HTTPResponse.drain_conn() would call HTTPResponse.read() in a way that decoded/decompressed the entire redirect response body even before any streaming reads were performed, effectively bypassing decompression-bomb safeguards. |
| urllib3 | 2.5.0 | >=1.0,<2.6.0 |
show Affected versions of the urllib3 package are vulnerable to Denial of Service (DoS) due to improper handling of highly compressed HTTP response bodies during streaming decompression. The urllib3.HTTPResponse methods stream(), read(), read1(), read_chunked(), and readinto() may fully decompress a minimal but highly compressed payload based on the Content-Encoding header into an internal buffer instead of limiting the decompressed output to the requested chunk size, causing excessive CPU usage and massive memory allocation on the client side. |
| urllib3 | 2.5.0 | >=1.24,<2.6.0 |
show Affected versions of the urllib3 package are vulnerable to Denial of Service (DoS) due to allowing an unbounded number of content-encoding decompression steps for HTTP responses. The HTTPResponse content decoding pipeline in urllib3 follows the Content-Encoding header and applies each advertised compression algorithm in sequence without enforcing a maximum chain length or effective output size, so a malicious peer can send a response with a very long encoding chain that triggers excessive CPU use and massive memory allocation during decompression. |
https://pyup.io/repos/github/mzollin/qr-pirate/python-3-shield.svg
[](https://pyup.io/repos/github/mzollin/qr-pirate/)
.. image:: https://pyup.io/repos/github/mzollin/qr-pirate/python-3-shield.svg
:target: https://pyup.io/repos/github/mzollin/qr-pirate/
:alt: Python 3
<a href="https://pyup.io/repos/github/mzollin/qr-pirate/"><img src="https://pyup.io/repos/github/mzollin/qr-pirate/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/mzollin/qr-pirate/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/mzollin/qr-pirate/
{<img src="https://pyup.io/repos/github/mzollin/qr-pirate/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/mzollin/qr-pirate/]
https://pyup.io/repos/github/mzollin/qr-pirate/shield.svg
[](https://pyup.io/repos/github/mzollin/qr-pirate/)
.. image:: https://pyup.io/repos/github/mzollin/qr-pirate/shield.svg
:target: https://pyup.io/repos/github/mzollin/qr-pirate/
:alt: Updates
<a href="https://pyup.io/repos/github/mzollin/qr-pirate/"><img src="https://pyup.io/repos/github/mzollin/qr-pirate/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/mzollin/qr-pirate/shield.svg(Updates)!:https://pyup.io/repos/github/mzollin/qr-pirate/
{<img src="https://pyup.io/repos/github/mzollin/qr-pirate/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/mzollin/qr-pirate/]