CVE-2025-13836

Published: December 3, 2025Last modified: January 15, 2026

Description

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

Severity score breakdown

ParameterValue
Base score9.1
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSpython3Fixed (3.11.13-r2)
25 LTSpython3Fixed (3.12.12-r1)
Streampython3Fixed (3.12.12-r2)
Hardened Containers23 LTSpython3Fixed (3.11.13-r2)
25 LTSpython3Fixed (3.12.12-r1)
Streampython3Fixed (3.12.12-r2)

References

ON THIS PAGE