This fixes the following vulnerability:
- CVE-2025-53643:
In aiohttp prior to version 3.12.14, the Python parser is vulnerable
to a request smuggling vulnerability due to not parsing trailer
sections of an HTTP request. If a pure Python version of aiohttp is
installed (i.e. without the usual C extensions) or
AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to
execute a request smuggling attack to bypass certain firewalls or
proxy protections. Version 3.12.14 contains a patch for this issue.
https://www.cve.org/CVERecord?id=CVE-2025-53643
Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>
Signed-off-by: Arnout Vandecappelle <arnout@rnout.be>
6 lines
335 B
Plaintext
6 lines
335 B
Plaintext
# md5, sha256 from https://pypi.org/pypi/aiohttp/json
|
|
md5 4ed66dcec63108ae3a7c01d0415b4dd9 aiohttp-3.12.14.tar.gz
|
|
sha256 6e06e120e34d93100de448fd941522e11dafa78ef1a893c179901b7d66aa29f2 aiohttp-3.12.14.tar.gz
|
|
# Locally computed sha256 checksums
|
|
sha256 9f80d0db7d755a941db4572172c270ecbd8f082ba215ddd095985942ed94a9eb LICENSE.txt
|