CVE-2025-13836
Public on 2025-12-01
Modified on 2025-12-02
Description
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
| Platform | Package | Release Date | Advisory | Status |
|---|---|---|---|---|
| Amazon Linux 2 - Core | python | Not Affected | ||
| Amazon Linux 2 - Core | python3 | Not Affected | ||
| Amazon Linux 2023 | python3.11 | Pending Fix | ||
| Amazon Linux 2023 | python3.12 | Pending Fix | ||
| Amazon Linux 2023 | python3.13 | Pending Fix | ||
| Amazon Linux 2023 | python3.9 | Not Affected |
CVSS Scores
| Score Type | Score | Vector | |
|---|---|---|---|
| Amazon Linux | CVSSv3 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |