CVE Vulnerabilities

CVE-2024-30251

Loop with Unreachable Exit Condition ('Infinite Loop')

Published: May 02, 2024 | Modified: Nov 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.

Weakness

The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

Affected Software

NameVendorStart VersionEnd Version
AiohttpAiohttp*3.9.4 (excluding)
Red Hat Ansible Automation Platform 2.4 for RHEL 8RedHatautomation-controller-0:4.5.7-1.el8ap*
Red Hat Ansible Automation Platform 2.4 for RHEL 8RedHatpython3x-aiohttp-0:3.9.5-1.el8ap*
Red Hat Ansible Automation Platform 2.4 for RHEL 9RedHatautomation-controller-0:4.5.7-1.el9ap*
Red Hat Ansible Automation Platform 2.4 for RHEL 9RedHatpython-aiohttp-0:3.9.5-1.el9ap*
RHUI 4 for RHEL 8RedHatpython-aiohttp-0:3.9.4-1.el8ui*
Python-aiohttpUbuntuesm-apps/focal*
Python-aiohttpUbuntuesm-apps/jammy*
Python-aiohttpUbuntuesm-apps/noble*
Python-aiohttpUbuntufocal*
Python-aiohttpUbuntujammy*
Python-aiohttpUbuntumantic*
Python-aiohttpUbuntunoble*
Python-aiohttpUbuntuupstream*

References