{"affected":[{"ecosystem_specific":{"binaries":[{"python313-Brotli":"1.1.0-160000.3.1","python313-aiohttp":"3.11.16-160000.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 16.0","name":"python-Brotli","purl":"pkg:rpm/opensuse/python-Brotli&distro=openSUSE%20Leap%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1.0-160000.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python313-Brotli":"1.1.0-160000.3.1","python313-aiohttp":"3.11.16-160000.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 16.0","name":"python-aiohttp","purl":"pkg:rpm/opensuse/python-aiohttp&distro=openSUSE%20Leap%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.11.16-160000.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-aiohttp, python-Brotli fixes the following issues:\n\nChanges in python-aiohttp:\n\n- CVE-2025-69228: Fixed denial of service through large payloads (bsc#1256022).\n- CVE-2025-69226: Fixed brute-force leak of internal static file path components (bsc#1256020).\n- CVE-2025-69224: Fixed unicode processing of header values could cause parsing discrepancies (bsc#1256018).\n- CVE-2025-69223: Fixed aiohttp HTTP Parser auto_decompress feature susceptible to zip bomb (bsc#1256017).\n- CVE-2025-69227: Fixed DoS when bypassing asserts (bsc#1256021).\n- CVE-2025-69225: Fixed unicode match groups in regexes for ASCII protocol elements (bsc#1256019).\n- CVE-2025-69229: Fixed DoS through chunked messages (bsc#1256023).\n- CVE-2025-53643: Fixed request smuggling due to incorrect parsing of chunked trailer section (bsc#1246517).\n\nChanges in python-Brotli:\n\n- Add max length decompression (bsc#1254867, bsc#1256017).\n","id":"openSUSE-SU-2026:20204-1","modified":"2026-02-12T14:01:04Z","published":"2026-02-12T14:01:04Z","references":[{"type":"ADVISORY","url":null},{"type":"REPORT","url":"https://bugzilla.suse.com/1246517"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256017"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256018"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256019"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256020"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256021"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256022"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-53643"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-69229"}],"related":["CVE-2025-53643","CVE-2025-69223","CVE-2025-69224","CVE-2025-69225","CVE-2025-69226","CVE-2025-69227","CVE-2025-69228","CVE-2025-69229"],"summary":"Security update for python-aiohttp, python-Brotli","upstream":["CVE-2025-53643","CVE-2025-69223","CVE-2025-69224","CVE-2025-69225","CVE-2025-69226","CVE-2025-69227","CVE-2025-69228","CVE-2025-69229"]}