CVE-2025-69227
Publication date 6 January 2026
Last updated 16 February 2026
Ubuntu priority
Description
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow for an infinite loop to occur when assert statements are bypassed, resulting in a DoS attack when processing a POST body. If optimizations are enabled (-O or PYTHONOPTIMIZE=1), and the application includes a handler that uses the Request.post() method, then an attacker may be able to execute a DoS attack with a specially crafted message. This issue is fixed in version 3.13.3.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| python-aiohttp | 25.10 questing |
Fixed 3.11.16-1ubuntu0.1
|
| 24.04 LTS noble |
Fixed 3.9.1-1ubuntu0.1+esm2
|
|
| 22.04 LTS jammy |
Fixed 3.8.1-4ubuntu0.2+esm2
|
|
| 20.04 LTS focal |
Fixed 3.6.2-1ubuntu1+esm5
|
|
| 18.04 LTS bionic | Ignored backporting risks regression | |
| 16.04 LTS xenial | Ignored backporting risks regression |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialReferences
Related Ubuntu Security Notices (USN)
- USN-8032-1
- AIOHTTP vulnerabilities
- 13 February 2026