Source: python-aiohttp
Version: 3.13.3-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for python-aiohttp.

CVE-2026-34513[0]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.13.4, an unbounded DNS cache could
| result in excessive memory usage possibly resulting in a DoS
| situation. This issue has been patched in version 3.13.4.


CVE-2026-34514[1]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.13.4, an attacker who controls the
| content_type parameter in aiohttp could use this to inject extra
| headers or similar exploits. This issue has been patched in version
| 3.13.4.


CVE-2026-34516[2]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.13.4, a response with an excessive
| number of multipart headers may be allowed to use more memory than
| intended, potentially allowing a DoS vulnerability. This issue has
| been patched in version 3.13.4.


CVE-2026-34517[3]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.13.4, for some multipart form fields,
| aiohttp read the entire field into memory before checking
| client_max_size. This issue has been patched in version 3.13.4.


CVE-2026-34518[4]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.13.4, when following redirects to a
| different origin, aiohttp drops the Authorization header, but
| retains the Cookie and Proxy-Authorization headers. This issue has
| been patched in version 3.13.4.


CVE-2026-34519[5]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.13.4, an attacker who controls the
| reason parameter when creating a Response may be able to inject
| extra headers or similar exploits. This issue has been patched in
| version 3.13.4.


CVE-2026-34520[6]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.13.4, the C parser (the default for
| most installs) accepted null bytes and control characters in
| response headers. This issue has been patched in version 3.13.4.


CVE-2026-34525[7]:
| AIOHTTP is an asynchronous HTTP client/server framework for asyncio
| and Python. Prior to version 3.13.4, multiple Host headers were
| allowed in aiohttp. This issue has been patched in version 3.13.4.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-34513
    https://www.cve.org/CVERecord?id=CVE-2026-34513
[1] https://security-tracker.debian.org/tracker/CVE-2026-34514
    https://www.cve.org/CVERecord?id=CVE-2026-34514
[2] https://security-tracker.debian.org/tracker/CVE-2026-34516
    https://www.cve.org/CVERecord?id=CVE-2026-34516
[3] https://security-tracker.debian.org/tracker/CVE-2026-34517
    https://www.cve.org/CVERecord?id=CVE-2026-34517
[4] https://security-tracker.debian.org/tracker/CVE-2026-34518
    https://www.cve.org/CVERecord?id=CVE-2026-34518
[5] https://security-tracker.debian.org/tracker/CVE-2026-34519
    https://www.cve.org/CVERecord?id=CVE-2026-34519
[6] https://security-tracker.debian.org/tracker/CVE-2026-34520
    https://www.cve.org/CVERecord?id=CVE-2026-34520
[7] https://security-tracker.debian.org/tracker/CVE-2026-34525
    https://www.cve.org/CVERecord?id=CVE-2026-34525

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to