| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| aiohttp | pip | <= 3.13.2 | 3.13.3 |
The analysis of the security patch clearly indicates that the vulnerability lies within the parse_cookie_header function in aiohttp/_cookie_helpers.py. The core of the vulnerability is the repeated logging of warnings for each invalid cookie found in the Cookie header. The provided patch explicitly removes the internal_logger.warning calls inside the loop that iterates over cookies and replaces them with a mechanism that collects all invalid names to be logged in a single, less severe, debug message at the end of the function. This directly addresses the 'logging storm' issue described in the advisory. The test cases added in the patch confirm that accessing the request.cookies attribute triggers this parsing logic and that the fix prevents an excessive number of log records from being created.
aiohttp._cookie_helpers.parse_cookie_headeraiohttp/_cookie_helpers.py
A Semantic Attack on Google Gemini - Read the Latest Research