CVE-2024-52304

Publication date 18 November 2024

Last updated 18 July 2025


Ubuntu priority

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

Status

Package Ubuntu Release Status
python-aiohttp 25.04 plucky
Not affected
24.10 oracular Ignored end of life, was needed
24.04 LTS noble
Fixed 3.9.1-1ubuntu0.1+esm1
22.04 LTS jammy
Fixed 3.8.1-4ubuntu0.2+esm1
20.04 LTS focal
Fixed 3.6.2-1ubuntu1+esm4
18.04 LTS bionic
Fixed 3.0.1-1ubuntu0.1~esm5
16.04 LTS xenial
Not affected

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial