summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-aiohttp/CVE-2025-69225.patch
diff options
context:
space:
mode:
authorGyorgy Sarvari <skandigraun@gmail.com>2026-02-07 11:33:50 +0100
committerAnuj Mittal <anuj.mittal@oss.qualcomm.com>2026-02-12 13:38:12 +0530
commit0f91805c4b9de8d70a247159b34992bbfa723fab (patch)
treec22c495b85afc772234bac732491ec4c384e3950 /meta-python/recipes-devtools/python/python3-aiohttp/CVE-2025-69225.patch
parentd691a39655c535e4a47c8ad0afe6f8c57f65ef5a (diff)
downloadmeta-openembedded-0f91805c4b9de8d70a247159b34992bbfa723fab.tar.gz
python3-aiohttp: patch CVE-2025-69225
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-69225 Backport the patch that is referenced by the NVD report. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Anuj Mittal <anuj.mittal@oss.qualcomm.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-aiohttp/CVE-2025-69225.patch')
-rw-r--r--meta-python/recipes-devtools/python/python3-aiohttp/CVE-2025-69225.patch49
1 files changed, 49 insertions, 0 deletions
diff --git a/meta-python/recipes-devtools/python/python3-aiohttp/CVE-2025-69225.patch b/meta-python/recipes-devtools/python/python3-aiohttp/CVE-2025-69225.patch
new file mode 100644
index 0000000000..cadfe27adc
--- /dev/null
+++ b/meta-python/recipes-devtools/python/python3-aiohttp/CVE-2025-69225.patch
@@ -0,0 +1,49 @@
1From 9ef3eb4a9f79c106b8a5518fc600412ad81dff5c Mon Sep 17 00:00:00 2001
2From: "patchback[bot]" <45432694+patchback[bot]@users.noreply.github.com>
3Date: Sat, 3 Jan 2026 00:39:41 +0000
4Subject: [PATCH] Reject non-ascii digits in Range header (#11903)
5
6**This is a backport of PR #11887 as merged into master
7(7a067d1905e1eeb921a50010dd0004990dbb3bf0).**
8
9Co-authored-by: Sam Bull <git@sambull.org>
10
11CVE: CVE-2025-69225
12Upstream-Status: Backport [https://github.com/aio-libs/aiohttp/commit/c7b7a044f88c71cefda95ec75cdcfaa4792b3b96]
13Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
14---
15 aiohttp/web_request.py | 2 +-
16 tests/test_web_request.py | 7 +++++++
17 2 files changed, 8 insertions(+), 1 deletion(-)
18
19diff --git a/aiohttp/web_request.py b/aiohttp/web_request.py
20index 4bc670a..d565557 100644
21--- a/aiohttp/web_request.py
22+++ b/aiohttp/web_request.py
23@@ -598,7 +598,7 @@ class BaseRequest(MutableMapping[str, Any], HeadersMixin):
24 if rng is not None:
25 try:
26 pattern = r"^bytes=(\d*)-(\d*)$"
27- start, end = re.findall(pattern, rng)[0]
28+ start, end = re.findall(pattern, rng, re.ASCII)[0]
29 except IndexError: # pattern was not found in header
30 raise ValueError("range not in acceptable format")
31
32diff --git a/tests/test_web_request.py b/tests/test_web_request.py
33index c6398ac..704fc18 100644
34--- a/tests/test_web_request.py
35+++ b/tests/test_web_request.py
36@@ -227,6 +227,13 @@ def test_range_to_slice_tail_stop() -> None:
37 assert req.content[req.http_range] == payload[-500:]
38
39
40+def test_range_non_ascii() -> None:
41+ # ५ = DEVANAGARI DIGIT FIVE
42+ req = make_mocked_request("GET", "/", headers=CIMultiDict([("RANGE", "bytes=4-५")]))
43+ with pytest.raises(ValueError, match="range not in acceptable format"):
44+ req.http_range
45+
46+
47 def test_non_keepalive_on_http10() -> None:
48 req = make_mocked_request("GET", "/", version=HttpVersion(1, 0))
49 assert not req.keep_alive