Updated: 2026-01-09 09:45:11.273326
Description:
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | CRITICAL | 9.1 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| Alpine Linux 3.22 | python | 3.6 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-27 16:43:57 | ||
| Debian 10 | python | 3.6 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-12 17:18:40 | ||
| Debian 10 | python | 2.7 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-12 17:18:38 | ||
| Debian 11 | python | 2.7 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-12 17:18:38 | ||
| Debian 11 | python | 3.6 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-12 17:18:39 | ||
| Debian 12 | python | 3.9 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-12 17:18:30 | ||
| Debian 12 | python | 3.7 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-12 17:18:27 | ||
| Debian 12 | python | 3.6 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-12 17:18:39 | ||
| Debian 12 | python | 2.7 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-12 17:18:38 | ||
| Debian 12 | python | 3.8 | 9.1 | CRITICAL | Released | CLSA-2026:1768588281 | 2026-01-16 18:51:59 |