OESA-2025-1046

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1046
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1046.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1046
Upstream
Published
2025-01-17T14:07:21Z
Modified
2025-08-12T05:46:40.616714Z
Summary
python-aiohttp security update
Details

Async http client/server framework (asyncio).

Security Fix(es):

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.(CVE-2024-52304)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:rpm/openEuler/python-aiohttp&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.4-4.oe2003sp4

Ecosystem specific

{
    "src": [
        "python-aiohttp-3.7.4-4.oe2003sp4.src.rpm"
    ],
    "x86_64": [
        "python-aiohttp-debuginfo-3.7.4-4.oe2003sp4.x86_64.rpm",
        "python-aiohttp-debugsource-3.7.4-4.oe2003sp4.x86_64.rpm",
        "python-aiohttp-help-3.7.4-4.oe2003sp4.x86_64.rpm",
        "python3-aiohttp-3.7.4-4.oe2003sp4.x86_64.rpm"
    ],
    "aarch64": [
        "python-aiohttp-debuginfo-3.7.4-4.oe2003sp4.aarch64.rpm",
        "python-aiohttp-debugsource-3.7.4-4.oe2003sp4.aarch64.rpm",
        "python-aiohttp-help-3.7.4-4.oe2003sp4.aarch64.rpm",
        "python3-aiohttp-3.7.4-4.oe2003sp4.aarch64.rpm"
    ]
}