{"id":"AZL-73529","summary":"CVE-2025-69227 affecting package python-aiohttp 3.6.2-3","details":"AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow for an infinite loop to occur when assert statements are bypassed, resulting in a DoS attack when processing a POST body. If optimizations are enabled (-O or PYTHONOPTIMIZE=1), and the application includes a handler that uses the Request.post() method, then an attacker may be able to execute a DoS attack with a specially crafted message. This issue is fixed in version 3.13.3.","modified":"2026-04-01T05:22:38.629547Z","published":"2026-01-06T00:15:48Z","upstream":["CVE-2025-69227"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-69227"}],"affected":[{"package":{"name":"python-aiohttp","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/python-aiohttp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"3.6.2-3"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-73529.json"}}],"schema_version":"1.7.5"}