{"id":"OESA-2025-1048","summary":"python-aiohttp security update","details":"Async http client/server framework (asyncio).\r\n\r\nSecurity Fix(es):\r\n\r\naiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.(CVE-2024-52304)","modified":"2026-03-11T07:01:24.596269Z","published":"2025-01-17T14:07:23Z","upstream":["CVE-2024-52304"],"database_specific":{"severity":"Medium"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-52304"}],"affected":[{"package":{"name":"python-aiohttp","ecosystem":"openEuler:22.03-LTS-SP4","purl":"pkg:rpm/openEuler/python-aiohttp&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.7.4-5.oe2203sp4"}]}],"ecosystem_specific":{"src":["python-aiohttp-3.7.4-5.oe2203sp4.src.rpm"],"x86_64":["python-aiohttp-debuginfo-3.7.4-5.oe2203sp4.x86_64.rpm","python-aiohttp-debugsource-3.7.4-5.oe2203sp4.x86_64.rpm","python-aiohttp-help-3.7.4-5.oe2203sp4.x86_64.rpm","python3-aiohttp-3.7.4-5.oe2203sp4.x86_64.rpm"],"aarch64":["python-aiohttp-debuginfo-3.7.4-5.oe2203sp4.aarch64.rpm","python-aiohttp-debugsource-3.7.4-5.oe2203sp4.aarch64.rpm","python-aiohttp-help-3.7.4-5.oe2203sp4.aarch64.rpm","python3-aiohttp-3.7.4-5.oe2203sp4.aarch64.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2025-1048.json"}}],"schema_version":"1.7.5"}