{"schema_version":"1.7.2","id":"OESA-2025-1047","modified":"2025-01-17T14:07:22Z","published":"2025-01-17T14:07:22Z","upstream":["CVE-2024-52304"],"summary":"python-aiohttp security update","details":"Async http client/server framework (asyncio).\r\n\r\nSecurity Fix(es):\r\n\r\naiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.(CVE-2024-52304)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"python-aiohttp","purl":"pkg:rpm/openEuler/python-aiohttp\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.9.3-6.oe2403"}]}],"ecosystem_specific":{"aarch64":["python-aiohttp-debuginfo-3.9.3-6.oe2403.aarch64.rpm","python-aiohttp-debugsource-3.9.3-6.oe2403.aarch64.rpm","python-aiohttp-help-3.9.3-6.oe2403.aarch64.rpm","python3-aiohttp-3.9.3-6.oe2403.aarch64.rpm"],"src":["python-aiohttp-3.9.3-6.oe2403.src.rpm"],"x86_64":["python-aiohttp-debuginfo-3.9.3-6.oe2403.x86_64.rpm","python-aiohttp-debugsource-3.9.3-6.oe2403.x86_64.rpm","python-aiohttp-help-3.9.3-6.oe2403.x86_64.rpm","python3-aiohttp-3.9.3-6.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1047"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-52304"}],"database_specific":{"severity":"Medium"}}