aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.5 for RHEL 9 Red Hat Ansible Automation Platform 2.5 for RHEL 8 Via RHSA-2024:10766 https://access.redhat.com/errata/RHSA-2024:10766
This issue has been addressed in the following products: Red Hat Satellite 6.16 for RHEL 8 Red Hat Satellite 6.16 for RHEL 9 Via RHSA-2024:11574 https://access.redhat.com/errata/RHSA-2024:11574
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.5 for RHEL 9 Red Hat Ansible Automation Platform 2.5 for RHEL 8 Via RHSA-2025:0340 https://access.redhat.com/errata/RHSA-2025:0340
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.5 for RHEL 8 Red Hat Ansible Automation Platform 2.5 for RHEL 9 Via RHSA-2025:0341 https://access.redhat.com/errata/RHSA-2025:0341
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.4 for RHEL 8 Red Hat Ansible Automation Platform 2.4 for RHEL 9 Via RHSA-2025:0722 https://access.redhat.com/errata/RHSA-2025:0722
This issue has been addressed in the following products: Ansible Automation Platform Execution Environments Via RHSA-2025:0753 https://access.redhat.com/errata/RHSA-2025:0753
This issue has been addressed in the following products: Ansible Automation Platform Execution Environments Via RHSA-2025:1101 https://access.redhat.com/errata/RHSA-2025:1101