Source: python-aiohttp Version: 3.10.10-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for python-aiohttp. CVE-2024-52303[0]: | aiohttp is an asynchronous HTTP client/server framework for asyncio | and Python. In versions starting with 3.10.6 and prior to 3.10.11, a | memory leak can occur when a request produces a MatchInfoError. This | was caused by adding an entry to a cache on each request, due to the | building of each MatchInfoError producing a unique cache entry. An | attacker may be able to exhaust the memory resources of a server by | sending a substantial number (100,000s to millions) of such | requests. Those who use any middlewares with aiohttp.web should | upgrade to version 3.10.11 to receive a patch. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-52303 https://www.cve.org/CVERecord?id=CVE-2024-52303 [1] https://github.com/aio-libs/aiohttp/security/advisories/GHSA-27mf-ghqm-j3j8 [2] https://github.com/aio-libs/aiohttp/commit/bc15db61615079d1b6327ba42c682f758fa96936 Regards, Salvatore