CVE-2025-13836
01.12.2025, 18:16
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| python2.7 |
| ||||||||||||||||
| python3.4 |
| ||||||||||||||||
| python3.5 |
| ||||||||||||||||
| python3.6 |
| ||||||||||||||||
| python3.7 |
| ||||||||||||||||
| python3.8 |
| ||||||||||||||||
| python3.9 |
| ||||||||||||||||
| python3.10 |
| ||||||||||||||||
| python3.11 |
| ||||||||||||||||
| python3.12 |
| ||||||||||||||||
| python3.13 |
| ||||||||||||||||
| python3.14 |
|
Vulnerability Media Exposure
References