fix(security): bump aiohttp 3.13.3→3.13.5, picomatch 2.3.1→2.3.2 (ENG-13677, ENG-13698–13701)#24
Conversation
…-13677, ENG-13698–ENG-13701) - langchain/: aiohttp 3.13.3 → 3.13.5 — fixes CVE-2026-22815, CVE-2026-34515, CVE-2026-34516, CVE-2026-34525 (and 6 additional aiohttp GHSAs). Added explicit floor pin `aiohttp>=3.13.5` to pyproject.toml. - zapier/: picomatch 2.3.1 → 2.3.2 via overrides — fixes CVE-2026-33672 (method injection via POSIX bracket expressions in POSIX_REGEX_SOURCE).
📝 WalkthroughWalkthroughThis pull request updates dependency configurations in two separate package files. The 🚥 Pre-merge checks | ✅ 2✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
There was a problem hiding this comment.
🧹 Nitpick comments (1)
langchain/pyproject.toml (1)
35-35: Consider adding an upper bound for theaiohttpmajor version.
>=3.13.5correctly addresses the security floor, but constraining to<4.0.0aligns with semantic versioning best practices and prevents unexpected major version upgrades in the future.♻️ Proposed change
-aiohttp = ">=3.13.5" +aiohttp = ">=3.13.5,<4.0.0"🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed. In `@langchain/pyproject.toml` at line 35, The aiohttp dependency in pyproject (the line specifying aiohttp = ">=3.13.5") lacks an upper bound; change that requirement to include a `<4.0.0` upper bound (e.g., `>=3.13.5,<4.0.0`) so major-version upgrades are prevented while keeping the security floor; update the aiohttp entry in langchain/pyproject.toml accordingly.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Nitpick comments:
In `@langchain/pyproject.toml`:
- Line 35: The aiohttp dependency in pyproject (the line specifying aiohttp =
">=3.13.5") lacks an upper bound; change that requirement to include a `<4.0.0`
upper bound (e.g., `>=3.13.5,<4.0.0`) so major-version upgrades are prevented
while keeping the security floor; update the aiohttp entry in
langchain/pyproject.toml accordingly.
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro
Run ID: 9b72a67c-e5fb-4662-8f77-952c04663ef9
⛔ Files ignored due to path filters (2)
langchain/poetry.lockis excluded by!**/*.lockzapier/package-lock.jsonis excluded by!**/package-lock.json
📒 Files selected for processing (2)
langchain/pyproject.tomlzapier/package.json
Vulnerability Fixes
Changes
aiohttp>=3.13.5(transitive dep)"picomatch": "^2.3.2"to overridesaiohttp 3.13.5 also fixes 6 additional GHSAs (CVSS 2.7–6.9) beyond the 4 MEDIUM tickets above.
Changelog impact summary
Fixes ENG-13677, ENG-13698, ENG-13699, ENG-13700, ENG-13701.