Bug 2380012 - CVE-2025-53643 python-aiohttp: AIOHTTP HTTP Request/Response Smuggling [epel-9]
Summary: CVE-2025-53643 python-aiohttp: AIOHTTP HTTP Request/Response Smuggling [epel-9]
Keywords:
Status: NEW
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: python-aiohttp
Version: epel9
Hardware: Unspecified
OS: Unspecified
low
low
Target Milestone: ---
Assignee: Jonathan Wright
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["3c0b2582-d86a-4de3-aaa9-7...
Depends On:
Blocks: CVE-2025-53643
TreeView+ depends on / blocked
 
Reported: 2025-07-14 21:56 UTC by Jon Moroney
Modified: 2025-10-16 09:55 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Jon Moroney 2025-07-14 21:56:34 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams

Comment 1 Ben Beasley 2025-10-16 09:55:45 UTC
Further version updates in EPEL9 aren’t practical for compatibility reasons (either dependencies or breaking changes – I don’t recall which). The fix looks like it might be possible to backport, but not quite trivial. Considering this, the low CVSS score, and the special circumstances required (the AIOHTTP_NO_EXTENSIONS environment variable would have to be set to disable C extensions), I’m not planning to attempt to backport the patch. I’ll leave the bug open in case someone else is interested in doing so.


Note You need to log in before you can comment on or make changes to this bug.