Source: python-aiohttp
Version: 3.10.10-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for python-aiohttp.

CVE-2024-52303[0]:
| aiohttp is an asynchronous HTTP client/server framework for asyncio
| and Python. In versions starting with 3.10.6 and prior to 3.10.11, a
| memory leak can occur when a request produces a MatchInfoError. This
| was caused by adding an entry to a cache on each request, due to the
| building of each MatchInfoError producing a unique cache entry. An
| attacker may be able to exhaust the memory resources of a server by
| sending a substantial number (100,000s to millions) of such
| requests. Those who use any middlewares with aiohttp.web should
| upgrade to version 3.10.11 to receive a patch.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-52303
    https://www.cve.org/CVERecord?id=CVE-2024-52303
[1] https://github.com/aio-libs/aiohttp/security/advisories/GHSA-27mf-ghqm-j3j8
[2] 
https://github.com/aio-libs/aiohttp/commit/bc15db61615079d1b6327ba42c682f758fa96936

Regards,
Salvatore

Reply via email to