{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"python-aiohttp security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for python-aiohttp is now available for openEuler-22.03-LTS-SP3",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Async http client/server framework (asyncio).\n\nSecurity Fix(es):\n\naiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues.(CVE-2023-47627)\n\naiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.(CVE-2023-49082)\n\naiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input.  Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.(CVE-2024-23829)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for python-aiohttp is now available for openEuler-22.03-LTS-SP3.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"python-aiohttp",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-1346",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1346"
			},
			{
				"summary":"CVE-2023-47627",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-47627&packageName=python-aiohttp"
			},
			{
				"summary":"CVE-2023-49082",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-49082&packageName=python-aiohttp"
			},
			{
				"summary":"CVE-2024-23829",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-23829&packageName=python-aiohttp"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-47627"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-49082"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23829"
			},
			{
				"summary":"openEuler-SA-2025-1346 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-1346.json"
			}
		],
		"title":"An update for python-aiohttp is now available for openEuler-22.03-LTS-SP3",
		"tracking":{
			"initial_release_date":"2025-03-29T14:31:52+08:00",
			"revision_history":[
				{
					"date":"2025-03-29T14:31:52+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-03-29T14:31:52+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-03-29T14:31:52+08:00",
			"id":"openEuler-SA-2025-1346",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"openEuler-22.03-LTS-SP3",
									"name":"openEuler-22.03-LTS-SP3"
								},
								"name":"openEuler-22.03-LTS-SP3",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python-aiohttp-3.7.4-6.oe2203sp3.src.rpm",
									"name":"python-aiohttp-3.7.4-6.oe2203sp3.src.rpm"
								},
								"name":"python-aiohttp-3.7.4-6.oe2203sp3.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64.rpm",
									"name":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64.rpm"
								},
								"name":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64.rpm",
									"name":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64.rpm"
								},
								"name":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64.rpm",
									"name":"python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64.rpm"
								},
								"name":"python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-aiohttp-3.7.4-6.oe2203sp3.aarch64.rpm",
									"name":"python3-aiohttp-3.7.4-6.oe2203sp3.aarch64.rpm"
								},
								"name":"python3-aiohttp-3.7.4-6.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64.rpm",
									"name":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64.rpm"
								},
								"name":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64.rpm",
									"name":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64.rpm"
								},
								"name":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64.rpm",
									"name":"python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64.rpm"
								},
								"name":"python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-aiohttp-3.7.4-6.oe2203sp3.x86_64.rpm",
									"name":"python3-aiohttp-3.7.4-6.oe2203sp3.x86_64.rpm"
								},
								"name":"python3-aiohttp-3.7.4-6.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python-aiohttp-3.7.4-6.oe2203sp3.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
					"name":"python-aiohttp-3.7.4-6.oe2203sp3.src as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
					"name":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
					"name":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
					"name":"python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-aiohttp-3.7.4-6.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
					"name":"python3-aiohttp-3.7.4-6.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
					"name":"python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
					"name":"python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
					"name":"python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-aiohttp-3.7.4-6.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64",
					"name":"python3-aiohttp-3.7.4-6.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-47627",
			"notes":[
				{
					"text":"aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
					],
					"details":"python-aiohttp security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1346"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-47627"
		},
		{
			"cve":"CVE-2023-49082",
			"notes":[
				{
					"text":"aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
					],
					"details":"python-aiohttp security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1346"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-49082"
		},
		{
			"cve":"CVE-2024-23829",
			"notes":[
				{
					"text":"aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input.  Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
					],
					"details":"python-aiohttp security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1346"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:python-aiohttp-3.7.4-6.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debuginfo-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-debugsource-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python-aiohttp-help-3.7.4-6.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-aiohttp-3.7.4-6.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-23829"
		}
	]
}