Updated: 2026-02-04 05:06:12.616701
Description:
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | CRITICAL | 9.1 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | python3.11 | 3.11.2 | 9.1 | CRITICAL | Released | CLSA-2026:1768412660 | 2026-01-15 01:19:42 | |
| AlmaLinux 9.2 ESU | python3 | 3.9.16 | 9.1 | CRITICAL | Not Vulnerable | 2026-02-09 20:36:09 | ||
| CentOS 6 ELS | python | 2.6.6 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-20 01:23:17 | ||
| CentOS 7 ELS | python | 2.7.5 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-20 01:23:16 | ||
| CentOS 7 ELS | python3 | 3.6.8 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-20 01:23:13 | ||
| CentOS 8.4 ELS | python3 | 3.6.8 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-30 14:53:21 | ||
| CentOS 8.4 ELS | python2 | 2.7.18 | 9.1 | CRITICAL | Not Vulnerable | 2026-02-04 20:13:47 | ||
| CentOS 8.5 ELS | python2 | 2.7.18 | 9.1 | CRITICAL | Not Vulnerable | 2026-02-04 20:13:45 | ||
| CentOS 8.5 ELS | python3 | 3.6.8 | 9.1 | CRITICAL | Not Vulnerable | 2026-01-30 14:53:22 | ||
| CentOS Stream 8 ELS | python2 | 2.7.18 | 9.1 | CRITICAL | In Testing | 2026-01-28 20:35:56 |