{"affected":[{"ecosystem_specific":{"binaries":[{"python3-aiohttp":"3.6.0-150100.3.32.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP4","name":"python-aiohttp","purl":"pkg:rpm/suse/python-aiohttp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.6.0-150100.3.32.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-aiohttp":"3.6.0-150100.3.32.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"python-aiohttp","purl":"pkg:rpm/suse/python-aiohttp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.6.0-150100.3.32.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-aiohttp":"3.6.0-150100.3.32.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP6","name":"python-aiohttp","purl":"pkg:rpm/suse/python-aiohttp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.6.0-150100.3.32.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-aiohttp":"3.6.0-150100.3.32.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP7","name":"python-aiohttp","purl":"pkg:rpm/suse/python-aiohttp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.6.0-150100.3.32.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-aiohttp fixes the following issues:\n  \n- CVE-2025-69228: Fixed denial of service through large payloads (bsc#1256022).\n- CVE-2025-69226: Fixed brute-force leak of internal static file path components (bsc#1256020).\n- CVE-2025-69224: Fixed unicode processing of header values could cause parsing discrepancies (bsc#1256018).\n- CVE-2025-69223: Fixed aiohttp HTTP Parser auto_decompress feature susceptible to zip bomb (bsc#1256017).\n- CVE-2025-69227: Fixed DoS when bypassing asserts (bsc#1256021).\n- CVE-2025-69225: Fixed unicode match groups in regexes for ASCII protocol elements (bsc#1256019).\n- CVE-2025-69229: Fixed DoS through chunked messages (bsc#1256023).\n","id":"SUSE-SU-2026:0859-1","modified":"2026-03-10T16:05:00Z","published":"2026-03-10T16:05:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260859-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256017"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256018"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256019"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256020"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256021"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256022"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69229"}],"related":["CVE-2025-69223","CVE-2025-69224","CVE-2025-69225","CVE-2025-69226","CVE-2025-69227","CVE-2025-69228","CVE-2025-69229"],"summary":"Security update for python-aiohttp","upstream":["CVE-2025-69223","CVE-2025-69224","CVE-2025-69225","CVE-2025-69226","CVE-2025-69227","CVE-2025-69228","CVE-2025-69229"]}