CVE-2025-13836

Updated: 2026-01-09 09:45:11.273326

Description:

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x CRITICAL 9.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Alpine Linux 3.22 python 3.6 9.1 CRITICAL Not Vulnerable 2026-01-27 16:43:57
Debian 10 python 3.6 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:40
Debian 10 python 2.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:38
Debian 11 python 2.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:38
Debian 11 python 3.6 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:39
Debian 12 python 3.9 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:30
Debian 12 python 3.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:27
Debian 12 python 3.6 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:39
Debian 12 python 2.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:38
Debian 12 python 3.8 9.1 CRITICAL Released CLSA-2026:1768588281 2026-01-16 18:51:59
Total: 33