Home

Description

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

PUBLISHED Reserved 2025-12-01 | Published 2025-12-01 | Updated 2025-12-02 | Assigner PSF




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L

Product status

Default status
unaffected

Any version before 3.14.1
affected

3.15.0a1 (python) before 3.15.0
affected

References

github.com/python/cpython/issues/119451 issue-tracking

github.com/python/cpython/pull/119454 patch

github.com/...ommit/4ce27904b597c77d74dd93f2c912676021a99155 patch

github.com/...ommit/5a4c4a033a4a54481be6870aa1896fad732555b5 patch

mail.python.org/.../thread/OQ6G7MKRQIS3OAREC3HNG3D2DPOU34XO/ vendor-advisory

cve.org (CVE-2025-13836)

nvd.nist.gov (CVE-2025-13836)

Download JSON