CVE-2025-13836

Updated: 2026-02-04 05:06:12.616701

Description:

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x CRITICAL 9.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU python3.11 3.11.2 9.1 CRITICAL Released CLSA-2026:1768412660 2026-01-15 01:19:42
AlmaLinux 9.2 ESU python3 3.9.16 9.1 CRITICAL Not Vulnerable 2026-02-09 20:36:09
CentOS 6 ELS python 2.6.6 9.1 CRITICAL Not Vulnerable 2026-01-20 01:23:17
CentOS 7 ELS python 2.7.5 9.1 CRITICAL Not Vulnerable 2026-01-20 01:23:16
CentOS 7 ELS python3 3.6.8 9.1 CRITICAL Not Vulnerable 2026-01-20 01:23:13
CentOS 8.4 ELS python3 3.6.8 9.1 CRITICAL Not Vulnerable 2026-01-30 14:53:21
CentOS 8.4 ELS python2 2.7.18 9.1 CRITICAL Not Vulnerable 2026-02-04 20:13:47
CentOS 8.5 ELS python2 2.7.18 9.1 CRITICAL Not Vulnerable 2026-02-04 20:13:45
CentOS 8.5 ELS python3 3.6.8 9.1 CRITICAL Not Vulnerable 2026-01-30 14:53:22
CentOS Stream 8 ELS python2 2.7.18 9.1 CRITICAL In Testing 2026-01-28 20:35:56
Total: 22