<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0332</id>
    <title>An update for python-aiosmtpd is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2024-12-20 09:52:52"/>
    <updated date="2024-12-20 09:52:52"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-34083" id="CVE-2024-34083" title="CVE-2024-34083 Base Score: 5.4 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

aiosmptd is a reimplementation of the Python stdlib smtpd.py based on asyncio. Prior to version 1.4.6, servers based on aiosmtpd accept extra unencrypted commands after STARTTLS, treating them as if they came from inside the encrypted connection. This could be exploited by a man-in-the-middle attack. Version 1.4.6 contains a patch for the issue. (CVE-2024-34083)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="python-aiosmtpd">
        <name>HCE 2.0</name>
        <package arch="noarch" name="python3-aiosmtpd" version="1.4.6" release="1.hce2">
          <filename>python3-aiosmtpd-1.4.6-1.hce2.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
