OESA-2024-1696

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1696
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1696.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-1696
Upstream
Published
2024-06-07T11:08:13Z
Modified
2025-08-12T05:43:51.562034Z
Summary
python-aiosmtpd security update
Details

This is a server for SMTP and related protocols, similar in utility to the standard library's smtpd.py module, but rewritten to be based on asyncio for Python 3.

Security Fix(es):

aiosmptd is a reimplementation of the Python stdlib smtpd.py based on asyncio. Prior to version 1.4.6, servers based on aiosmtpd accept extra unencrypted commands after STARTTLS, treating them as if they came from inside the encrypted connection. This could be exploited by a man-in-the-middle attack. Version 1.4.6 contains a patch for the issue.(CVE-2024-34083)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / python-aiosmtpd

Package

Name
python-aiosmtpd
Purl
pkg:rpm/openEuler/python-aiosmtpd&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.6-1.oe2203sp3

Ecosystem specific

{
    "noarch": [
        "python3-aiosmtpd-1.4.6-1.oe2203sp3.noarch.rpm",
        "python-aiosmtpd-help-1.4.6-1.oe2203sp3.noarch.rpm"
    ],
    "src": [
        "python-aiosmtpd-1.4.6-1.oe2203sp3.src.rpm"
    ]
}