CVE-2025-13836

Updated: 2026-01-09 09:45:11.273326

Description:

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x CRITICAL 9.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Debian 13 python 3.9 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:29
Debian 13 python 3.6 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:37
Debian 13 python 2.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:40
Debian 13 python 3.8 9.1 CRITICAL Released CLSA-2026:1768588081 2026-01-16 18:52:01
Debian 13 python 3.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:28
EL 10 python 2.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:42
EL 10 python 3.6 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:41
EL 7 python 2.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:34
EL 7 python 3.6 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:41
EL 8 python 2.7 9.1 CRITICAL Not Vulnerable 2026-01-12 17:18:34
Total: 33