OESA-2025-1496

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1496
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1496.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-1496
Upstream
Published
2025-05-09T12:43:13Z
Modified
2025-09-03T06:31:31.449619Z
Summary
python-h11 security update
Details

h11 is suitable for implementing both servers and clients, and has a pleasantly symmetric API: the events you send as a client are exactly the ones that you receive as a server and vice-versa.

Security Fix(es):

h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.(CVE-2025-43859)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / python-h11

Package

Name
python-h11
Purl
pkg:rpm/openEuler/python-h11&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.14.0-2.oe2403sp1

Ecosystem specific

{
    "noarch": [
        "python-h11-help-0.14.0-2.oe2403sp1.noarch.rpm",
        "python3-h11-0.14.0-2.oe2403sp1.noarch.rpm"
    ],
    "src": [
        "python-h11-0.14.0-2.oe2403sp1.src.rpm"
    ]
}