CVE-2025-69227

Publication date 6 January 2026

Last updated 16 February 2026


Ubuntu priority

Description

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow for an infinite loop to occur when assert statements are bypassed, resulting in a DoS attack when processing a POST body. If optimizations are enabled (-O or PYTHONOPTIMIZE=1), and the application includes a handler that uses the Request.post() method, then an attacker may be able to execute a DoS attack with a specially crafted message. This issue is fixed in version 3.13.3.

Status

Package Ubuntu Release Status
python-aiohttp 26.04 LTS resolute
Not affected
25.10 questing
Fixed 3.11.16-1ubuntu0.1
25.04 plucky Ignored end of life, was needs-triage
24.04 LTS noble
Fixed 3.9.1-1ubuntu0.1+esm2
22.04 LTS jammy
Fixed 3.8.1-4ubuntu0.2+esm2
20.04 LTS focal
Fixed 3.6.2-1ubuntu1+esm5
18.04 LTS bionic Ignored backporting risks regression
16.04 LTS xenial Ignored end of ESM support, was ignored [backporting risks regression]

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
python-aiohttp

Access our resources on patching vulnerabilities