Home / mailingsPDF  

[USN-8032-1] AIOHTTP vulnerabilities

Posted on 16 February 2026
Ubuntu Security

==========================================================================Ubuntu Security Notice USN-8032-1
February 13, 2026

python-aiohttp vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in AIOHTTP.

Software Description:
- python-aiohttp: Asynchronous HTTP client/server Python framework

Details:

Charles Chan discovered that AIOHTTP incorrectly handled the decompression
of compressed requests. A remote attacker could possibly use this issue to
cause a denial of service. This issue was only addressed in Ubuntu 25.10.
(CVE-2025-69223)

Thomas Rinsma discovered that AIOHTTP incorrectly handled non-ASCII
characters in HTTP headers. A remote attacker could possibly use this issue
to perform a request smuggling attack to bypass certain proxy protections.
This issue was only addressed in Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and
Ubuntu 25.10. (CVE-2025-69224)

Thomas Rinsma discovered that AIOHTTP incorrectly handled non-ASCII
characters in the Range header. A remote attacker could possibly use this
issue to perform a request smuggling attack. (CVE-2025-69225)

Thomas Rinsma discovered that AIOHTTP incorrectly handled path
normalization when serving static files. A remote attacker could possibly
use this issue to obtain sensitive information. (CVE-2025-69226)

Thomas Rinsma discovered that AIOHTTP incorrectly handled certain POST
request bodies. A remote attacker could possibly use this issue to cause a
denial of service. (CVE-2025-69227)

Thomas Rinsma discovered that AIOHTTP incorrectly handled large POST
request payloads. A remote attacker could possibly use this issue to cause
a denial of service. (CVE-2025-69228)

It was discovered that AIOHTTP incorrectly handled chunked messages. A
remote attacker could possibly use this issue to cause a denial of service.
(CVE-2025-69229)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
python3-aiohttp 3.11.16-1ubuntu0.1

Ubuntu 24.04 LTS
python3-aiohttp 3.9.1-1ubuntu0.1+esm2
Available with Ubuntu Pro

Ubuntu 22.04 LTS
python3-aiohttp 3.8.1-4ubuntu0.2+esm2
Available with Ubuntu Pro

Ubuntu 20.04 LTS
python3-aiohttp 3.6.2-1ubuntu1+esm5
Available with Ubuntu Pro

Ubuntu 18.04 LTS
python3-aiohttp 3.0.1-1ubuntu0.1~esm6
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8032-1
CVE-2025-69223, CVE-2025-69224, CVE-2025-69225, CVE-2025-69226,
CVE-2025-69227, CVE-2025-69228, CVE-2025-69229

Package Information:
https://launchpad.net/ubuntu/+source/python-aiohttp/3.11.16-1ubuntu0.1

--===============0304882939244163761==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature

 

TOP