Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

chore(deps): update dependency langgraph to v1.0.10 [security]#412

Open
renovate-bot wants to merge 1 commit intogoogleapis:mainfrom
renovate-bot:renovate/pypi-langgraph-vulnerability
Open

chore(deps): update dependency langgraph to v1.0.10 [security]#412
renovate-bot wants to merge 1 commit intogoogleapis:mainfrom
renovate-bot:renovate/pypi-langgraph-vulnerability

Conversation

@renovate-bot
Copy link
Contributor

This PR contains the following updates:

Package Change Age Confidence
langgraph (source, changelog) ==1.0.7==1.0.10 age confidence

GitHub Vulnerability Alerts

CVE-2026-28277

LangGraph checkpointers can load msgpack-encoded checkpoints that reconstruct Python objects during deserialization. If an attacker can modify checkpoint data in the backing store (for example, after a database compromise or other privileged write access to the persistence layer), they can potentially supply a crafted payload that triggers unsafe object reconstruction when the checkpoint is loaded.

This is a post-exploitation / defense-in-depth issue. Exploitation requires the ability to write attacker-controlled checkpoint bytes at rest. In most deployments that prerequisite already implies a serious incident; the additional risk is turning “checkpoint-store write access” into code execution in the application runtime, which can expand blast radius (for example by exposing environment variables or cloud credentials available to the runtime).

There is no evidence of exploitation in the wild, and LangGraph is not aware of a practical exploitation path in existing deployments today. This change is intended to reduce the blast radius of a checkpoint-store compromise.

Affected users / systems

Users may be affected if they:

  • use a persistent checkpointer (database, remote store, shared filesystem, etc.),
  • load/resume from checkpoints, and
  • operate in an environment where an attacker could gain privileged write access to checkpoint data in the backing store.

This issue requires the attacker to be able to modify persisted checkpoint bytes (or to compromise a trusted component that writes them). It is generally not reachable by an unauthenticated remote attacker in a correctly configured deployment.

Impact

  • Potential arbitrary code execution or other unsafe side effects during checkpoint deserialization.
  • Escalation from “write access to checkpoint store” to “code execution in the application runtime,” which may expose runtime secrets or provide access to other systems the runtime can reach.

Exploitation scenario (high level)

  1. Attacker gains privileged write access to the checkpoint store (for example, via database compromise, leaked credentials, or abuse of an administrative data path).
  2. Attacker writes a crafted checkpoint payload containing msgpack data intended to reconstruct dangerous objects.
  3. Application resumes and deserializes the checkpoint; unsafe reconstruction could execute attacker-controlled behavior.

Mitigation / remediation

LangGraph provides an allowlist-based hardening mechanism for msgpack checkpoint deserialization.

Strict mode (environment variable)

  • LANGGRAPH_STRICT_MSGPACK
    • When set truthy (1, true, yes), the default msgpack deserialization policy becomes strict.
    • Concretely: JsonPlusSerializer() will default allowed_msgpack_modules to None (strict) instead of True (warn-and-allow), unless allowed_msgpack_modules=... is explicitly passed.

allowed_msgpack_modules (serializer/checkpointer config)

This setting controls what msgpack “ext” types are allowed to be reconstructed.

  • True (default when strict mode is not enabled): allow all ext types, but log a warning when deserializing a type that is not explicitly registered.
  • None (strict): only a built-in safe set is reconstructed; other ext types are blocked.
  • [(module, class_name), ...] (strict allowlist): the built-in safe set plus exactly the listed symbols are reconstructed (exact-match).

Built-in safe set

A small set of types is always treated as safe to reconstruct (for example datetime types, uuid.UUID, decimal.Decimal, set/frozenset/deque, ipaddress types, pathlib paths, zoneinfo.ZoneInfo, compiled regex patterns, and selected LangGraph internal types).

Automatically derived allowlist (only when compiling graphs)

When LANGGRAPH_STRICT_MSGPACK is enabled and StateGraph is compiled, LangGraph derives an allowlist from the graph’s schemas and channels and applies it to the checkpointer.

  • The allowlist is built by walking the state/input/output/context schemas (plus node/branch input schemas) and channel value/update types. It includes Pydantic v1/v2 models, dataclasses, enums, TypedDict field types, and common typing constructs (containers, unions, Annotated).
  • LangGraph also includes a curated set of common LangChain message classes.

This derived allowlist is only applied if the selected checkpointer supports with_allowlist(...). If a user is constructing serializers/checkpointers manually (or using a checkpointer that does not support allowlist propagation), they will need to configure allowed_msgpack_modules themselves.

Operational guidance

  • Treat checkpoint stores as integrity-sensitive. Restrict write access and rotate credentials if compromise is suspected.
  • Enable strict mode (LANGGRAPH_STRICT_MSGPACK=true) in production if feasible, and rely on schema-driven allowlisting to reduce incompatibilities.
  • Avoid providing custom msgpack deserialization hooks that reconstruct arbitrary types unless checkpoint data is fully trusted.

Limitations / important notes

  • If a checkpointer implementation does not support allowlist application (i.e., does not implement with_allowlist), allowlist enforcement may be skipped (with a warning). In that situation, strict expectations may not hold.
  • If an application supplies a custom msgpack unpack hook (ext_hook), the custom hook controls reconstruction and can bypass the default allowlist checks (intentional escape hatch, but it weakens the protection).

LangSmith / hosted deployments note

LangSmith is not aware of this issue presenting risk to existing LangSmith-hosted deployments. The described threat model requires an attacker to tamper with the checkpoint persistence layer used by the deployment; typical hosted configurations are designed to prevent such access.

First reported by: yardenporat353


Release Notes

langchain-ai/langgraph (langgraph)

v1.0.10: langgraph==1.0.10

Compare Source

Changes since 1.0.10rc1

  • release(langgraph) 1.0.10 (#​6967)
  • release(checkpoint): 0.4.1 (#​6966)
  • chore: add serde events (#​6954)
  • chore: update defaults (#​6953)
  • release: rc2 (#​6949)
  • chore(deps-dev): bump the all-dependencies group across 1 directory with 3 updates (#​6946)

v1.0.9: langgraph==1.0.9

Compare Source

Changes since 1.0.8

  • release: langgraph + prebuilt (#​6875)
  • fix: sequential interrupt handling w/ functional API (#​6863)
  • chore: state_updated_at sort by (#​6857)
  • chore: bump orjson (#​6852)
  • chore: conformance testing (#​6842)
  • chore(deps): bump the all-dependencies group in /libs/langgraph with 6 updates (#​6815)
  • chore(deps): bump protobuf from 6.33.4 to 6.33.5 in /libs/langgraph (#​6833)
  • chore(deps): bump cryptography from 46.0.3 to 46.0.5 in /libs/langgraph (#​6837)
  • chore(deps): bump nbconvert from 7.16.6 to 7.17.0 in /libs/langgraph (#​6832)
  • chore: server runtime type (#​6774)
  • refactor: replace bare except with BaseException in AsyncQueue (#​6765)

v1.0.8: langgraph==1.0.8

Compare Source

Changes since 1.0.7

  • release(langgraph): 1.0.8 (#​6757)
  • chore: shallow copy futures (#​6755)
  • fix: pydantic messages double streaming (#​6753)
  • chore(deps-dev): bump ruff from 0.14.7 to 0.14.11 in /libs/sdk-py (#​6673)
  • chore: Omit lock when using connection pool (#​6734)
  • docs: enhance Runtime and ToolRuntime class descriptions for clarity (#​6689)
  • docs: add clarity to use of thread_id (#​6515)
  • docs: add docstrings to add_node overloads (#​6514)
  • docs: update notebook links and add archival notices for examples (#​6720)
  • release(cli): 0.4.12 (#​6716)

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate-bot renovate-bot requested review from a team as code owners March 9, 2026 13:59
@product-auto-label product-auto-label bot added the api: cloudsql-postgres Issues related to the googleapis/langchain-google-cloud-sql-pg-python API. label Mar 9, 2026
@dpebot
Copy link

dpebot commented Mar 9, 2026

/gcbrun

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

api: cloudsql-postgres Issues related to the googleapis/langchain-google-cloud-sql-pg-python API.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants