CVE-2024-52303

NameCVE-2024-52303
Descriptionaiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions starting with 3.10.6 and prior to 3.10.11, a memory leak can occur when a request produces a MatchInfoError. This was caused by adding an entry to a cache on each request, due to the building of each MatchInfoError producing a unique cache entry. An attacker may be able to exhaust the memory resources of a server by sending a substantial number (100,000s to millions) of such requests. Those who use any middlewares with aiohttp.web should upgrade to version 3.10.11 to receive a patch.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1088108

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-aiohttp (PTS)bullseye3.7.4-1fixed
bookworm3.8.4-1fixed
sid, trixie3.10.10-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-aiohttpsourcebullseye(not affected)
python-aiohttpsourcebookworm(not affected)
python-aiohttpsource(unstable)(unfixed)1088108

Notes

[bookworm] - python-aiohttp <not-affected> (Vulnerable code not present)
[bullseye] - python-aiohttp <not-affected> (Vulnerable code not present)
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-27mf-ghqm-j3j8
Introduced with: https://github.com/aio-libs/aiohttp/commit/d664327d2cb954eb65bbd006482c815f44467986 (v3.10.6rc0)
Fixed by: https://github.com/aio-libs/aiohttp/commit/bc15db61615079d1b6327ba42c682f758fa96936 (v3.10.11)

Search for package or bug name: Reporting problems