Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process. The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT. https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams
Further version updates in EPEL9 aren’t practical for compatibility reasons (either dependencies or breaking changes – I don’t recall which). The fix looks like it might be possible to backport, but not quite trivial. Considering this, the low CVSS score, and the special circumstances required (the AIOHTTP_NO_EXTENSIONS environment variable would have to be set to disable C extensions), I’m not planning to attempt to backport the patch. I’ll leave the bug open in case someone else is interested in doing so.