Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 918968 (CVE-2023-49082)

Summary: <dev-python/aiohttp-3.9.0: CLRF injection via method
Product: Gentoo Security Reporter: Christopher Fore <csfore>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: IN_PROGRESS ---    
Severity: normal CC: python, zmedico
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx
Whiteboard: A3 [glsa?]
Package list:
Runtime testing required: ---

Description Christopher Fore 2023-12-01 18:14:15 UTC
CVE-2023-49082 (https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx):

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-12-22 01:25:33 UTC
Tree is clean:

commit 0482e646047d37536afc26291d6374b31ec03550
Author: Michał Górny <mgorny@gentoo.org>
Date:   Sun Dec 10 15:24:38 2023 +0100

    dev-python/aiohttp: Remove old

    Signed-off-by: Michał Górny <mgorny@gentoo.org>