{"schema_version":"1.7.2","id":"OESA-2025-1497","modified":"2025-05-09T12:43:14Z","published":"2025-05-09T12:43:14Z","upstream":["CVE-2025-43859"],"summary":"python-h11 security update","details":"h11 is suitable for implementing both servers and clients, and has a pleasantly symmetric API: the events you send as a client are exactly the ones that you receive as a server and vice-versa.\r\n\r\nSecurity Fix(es):\n\nh11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11\u0026apos;s parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.(CVE-2025-43859)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"python-h11","purl":"pkg:rpm/openEuler/python-h11\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.14.0-2.oe2403"}]}],"ecosystem_specific":{"noarch":["python-h11-help-0.14.0-2.oe2403.noarch.rpm","python3-h11-0.14.0-2.oe2403.noarch.rpm"],"src":["python-h11-0.14.0-2.oe2403.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1497"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-43859"}],"database_specific":{"severity":"Critical"}}