Home / mailingsPDF  

[USN-7642-1] AIOHTTP vulnerabilities

Posted on 18 July 2025
Ubuntu Security

==========================================================================Ubuntu Security Notice USN-7642-1
July 17, 2025

python-aiohttp vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in AIOHTTP.

Software Description:
- python-aiohttp: Asynchronous HTTP client/server Python framework

Details:

Ben Kallus discovered that AIOHTTP did not correctly parse HTTP
headers. A remote attacker could possibly use this issue to perform
request smuggling. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-47627)

Ivan Novikov discovered that AIOHTTP did not properly validate certain
inputs. A remote attacker could possibly use this issue to perform request
smuggling. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-49081, CVE-2023-49082)

Paul J. Dorn discovered that AIOHTTP did not properly validate certain
inputs. A remote attacker could possibly use this issue to perform request
smuggling. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and
Ubuntu 24.04 LTS. (CVE-2024-23829)

Takeshi Kaneko discovered that AIOHTTP did not properly sanitize certain
inputs. A remote attacker could possibly use this issue to perform a
cross-site scripting (XSS) attack. (CVE-2024-27306)

It was discovered that AIOHTTP did not correctly handle certain POST
requests. A remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-30251)

Jeppe Bonde Weikop discovered that AIOHTTP did not correctly handle
parsing newlines in certain inputs. A remote attacker could possibly use
this issue to perform request smuggling. (CVE-2024-52304)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
python3-aiohttp 3.9.1-1ubuntu0.1+esm1
Available with Ubuntu Pro

Ubuntu 22.04 LTS
python3-aiohttp 3.8.1-4ubuntu0.2+esm1
Available with Ubuntu Pro

Ubuntu 20.04 LTS
python3-aiohttp 3.6.2-1ubuntu1+esm4
Available with Ubuntu Pro

Ubuntu 18.04 LTS
python3-aiohttp 3.0.1-1ubuntu0.1~esm5
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7642-1
CVE-2023-47627, CVE-2023-49081, CVE-2023-49082, CVE-2024-23829,
CVE-2024-27306, CVE-2024-30251, CVE-2024-52304

--===============7323557862998485544==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature

 

TOP