Package: python-aiohttp
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerability was published for python-aiohttp.

CVE-2025-53643[0]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.12.14, the Python parser is
| vulnerable to a request smuggling vulnerability due to not parsing
| trailer sections of an HTTP request. If a pure Python version of
| aiohttp is installed (i.e. without the usual C extensions) or
| AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to
| execute a request smuggling attack to bypass certain firewalls or
| proxy protections. Version 3.12.14 contains a patch for this issue.

https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj
https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a
 (v3.12.14)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-53643
    https://www.cve.org/CVERecord?id=CVE-2025-53643

Please adjust the affected versions in the BTS as needed.

Reply via email to