Security update for python-aiohttp, python-Brotli
| Announcement ID: | SUSE-SU-2026:20425-1 |
|---|---|
| Release Date: | 2026-02-12T14:01:04Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves eight vulnerabilities and has one fix can now be installed.
Description:
This update for python-aiohttp, python-Brotli fixes the following issues:
Changes in python-aiohttp:
- CVE-2025-69228: Fixed denial of service through large payloads (bsc#1256022).
- CVE-2025-69226: Fixed brute-force leak of internal static file path components (bsc#1256020).
- CVE-2025-69224: Fixed unicode processing of header values could cause parsing discrepancies (bsc#1256018).
- CVE-2025-69223: Fixed aiohttp HTTP Parser auto_decompress feature susceptible to zip bomb (bsc#1256017).
- CVE-2025-69227: Fixed DoS when bypassing asserts (bsc#1256021).
- CVE-2025-69225: Fixed unicode match groups in regexes for ASCII protocol elements (bsc#1256019).
- CVE-2025-69229: Fixed DoS through chunked messages (bsc#1256023).
- CVE-2025-53643: Fixed request smuggling due to incorrect parsing of chunked trailer section (bsc#1246517).
Changes in python-Brotli:
- Add max length decompression (bsc#1254867, bsc#1256017).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 16.0
zypper in -t patch SUSE-SLES-16.0-259=1 -
SUSE Linux Enterprise Server for SAP Applications 16.0
zypper in -t patch SUSE-SLES-16.0-259=1
Package List:
-
SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64)
- python313-aiohttp-3.11.16-160000.3.1
- python313-Brotli-debuginfo-1.1.0-160000.3.1
- python-aiohttp-debugsource-3.11.16-160000.3.1
- python313-aiohttp-debuginfo-3.11.16-160000.3.1
- python-Brotli-debugsource-1.1.0-160000.3.1
- python313-Brotli-1.1.0-160000.3.1
-
SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64)
- python313-aiohttp-3.11.16-160000.3.1
- python313-Brotli-debuginfo-1.1.0-160000.3.1
- python-aiohttp-debugsource-3.11.16-160000.3.1
- python313-aiohttp-debuginfo-3.11.16-160000.3.1
- python-Brotli-debugsource-1.1.0-160000.3.1
- python313-Brotli-1.1.0-160000.3.1
References:
- https://www.suse.com/security/cve/CVE-2025-53643.html
- https://www.suse.com/security/cve/CVE-2025-69223.html
- https://www.suse.com/security/cve/CVE-2025-69224.html
- https://www.suse.com/security/cve/CVE-2025-69225.html
- https://www.suse.com/security/cve/CVE-2025-69226.html
- https://www.suse.com/security/cve/CVE-2025-69227.html
- https://www.suse.com/security/cve/CVE-2025-69228.html
- https://www.suse.com/security/cve/CVE-2025-69229.html
- https://bugzilla.suse.com/show_bug.cgi?id=1246517
- https://bugzilla.suse.com/show_bug.cgi?id=1254867
- https://bugzilla.suse.com/show_bug.cgi?id=1256017
- https://bugzilla.suse.com/show_bug.cgi?id=1256018
- https://bugzilla.suse.com/show_bug.cgi?id=1256019
- https://bugzilla.suse.com/show_bug.cgi?id=1256020
- https://bugzilla.suse.com/show_bug.cgi?id=1256021
- https://bugzilla.suse.com/show_bug.cgi?id=1256022
- https://bugzilla.suse.com/show_bug.cgi?id=1256023