upgrade aiohttp to 3.13.3 to prevent zip bomb DoS#437
Conversation
|
Important Review skippedAuto reviews are disabled on base/target branches other than the default branch. Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: rpancham The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/lgtm |
4450978
into
opendatahub-io:stable-2.x
Addresses : https://issues.redhat.com/browse/RHOAIENG-43597
This PR addresses RHOAIENG-43597 by fixing a denial-of-service vulnerability in the transitive dependency aiohttp. Versions ≤3.13.2 are vulnerable to a zip-bomb attack via automatic decompression, which can lead to memory exhaustion. The dependency has been pinned to aiohttp 3.13.3, which includes the upstream fix, and the lockfile has been updated to ensure the resolved version is used at runtime. The fix was verified by confirming the installed aiohttp version inside the built container.