UBUNTU-CVE-2025-69224

Source
https://ubuntu.com/security/CVE-2025-69224
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-69224.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-69224
Upstream
Published
2026-01-05T23:15:00Z
Modified
2026-01-08T06:21:02.018440Z
Severity
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below of the Python HTTP parser may allow a request smuggling attack with the presence of non-ASCII characters. If a pure Python version of AIOHTTP is installed (i.e. without the usual C extensions) or AIOHTTPNOEXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. This issue is fixed in version 3.13.3.

References

Affected packages

Ubuntu:16.04:LTS

python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/ubuntu/python-aiohttp@0.20.2-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.17.2-1
0.17.4-1
0.17.4-1build1
0.20.2-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-aiohttp",
            "binary_version": "0.20.2-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-69224.json"

Ubuntu:25.04

python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/ubuntu/python-aiohttp@3.10.11-1build1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.9.5-1
3.10.11-1
3.10.11-1build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-aiohttp",
            "binary_version": "3.10.11-1build1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-69224.json"

Ubuntu:25.10

python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/ubuntu/python-aiohttp@3.11.16-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.10.11-1build1
3.11.16-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-aiohttp",
            "binary_version": "3.11.16-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-69224.json"

Ubuntu:Pro:18.04:LTS

python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/ubuntu/python-aiohttp@3.0.1-1ubuntu0.1~esm5?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.3-1build1
2.2.3-2
2.3.6-1

3.*

3.0.1-1
3.0.1-1ubuntu0.1~esm1
3.0.1-1ubuntu0.1~esm4
3.0.1-1ubuntu0.1~esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-aiohttp",
            "binary_version": "3.0.1-1ubuntu0.1~esm5"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-69224.json"

Ubuntu:Pro:20.04:LTS

python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/ubuntu/python-aiohttp@3.6.2-1ubuntu1+esm4?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.5.4-1
3.5.4-1build1
3.6.1-1
3.6.2-1
3.6.2-1build1
3.6.2-1ubuntu0.1~esm1
3.6.2-1ubuntu1
3.6.2-1ubuntu1+esm1
3.6.2-1ubuntu1+esm3
3.6.2-1ubuntu1+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-aiohttp",
            "binary_version": "3.6.2-1ubuntu1+esm4"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-69224.json"

Ubuntu:Pro:22.04:LTS

python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/ubuntu/python-aiohttp@3.8.1-4ubuntu0.2+esm1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.7.4-1
3.7.4-1build2
3.8.1-3
3.8.1-4
3.8.1-4build1
3.8.1-4ubuntu0.2
3.8.1-4ubuntu0.2+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-aiohttp",
            "binary_version": "3.8.1-4ubuntu0.2+esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-69224.json"

Ubuntu:Pro:24.04:LTS

python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/ubuntu/python-aiohttp@3.9.1-1ubuntu0.1+esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.8.4-1
3.9.1-1
3.9.1-1build1
3.9.1-1ubuntu0.1
3.9.1-1ubuntu0.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-aiohttp",
            "binary_version": "3.9.1-1ubuntu0.1+esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-69224.json"