Release date:
2026-01-14 17:44:24 UTC
Description:
- CVE-2025-13836: fixed memory exhaustion vulnerability when reading HTTP
responses with malicious Content-Length headers
Updated packages:
-
python3.11-3.11.2-2.el9_2.2.tuxcare.els14.i686.rpm
sha:6b85a00a61ce683f333ce49c75318e98a600a39a017cb3fe45e48f7b04968130
-
python3.11-3.11.2-2.el9_2.2.tuxcare.els14.x86_64.rpm
sha:7d13240fad14092d2e85f5a40599393c5b9de1c12448018c01831d718ea599c2
-
python3.11-debug-3.11.2-2.el9_2.2.tuxcare.els14.i686.rpm
sha:27df53326253c2837cc1d79fc2bbbf4fc1d6704815b7b349cd6dcdee82f1bd78
-
python3.11-debug-3.11.2-2.el9_2.2.tuxcare.els14.x86_64.rpm
sha:6ec26572a108df213e152667807a08b595c50b69d28edb0a8b756047b7622d67
-
python3.11-devel-3.11.2-2.el9_2.2.tuxcare.els14.i686.rpm
sha:6f66b78e0dc48cf51d2da51125f58fe7248a610aaffdc897311dc444e4f6d461
-
python3.11-devel-3.11.2-2.el9_2.2.tuxcare.els14.x86_64.rpm
sha:c8686f1b02c6c41e9ba6e71240dbcd0c1f953371c062e2a55005ccaf4fdb4c82
-
python3.11-idle-3.11.2-2.el9_2.2.tuxcare.els14.i686.rpm
sha:27cd02842741199d2cdfc4569b504a5a744c3439daeea930e2ef294634658357
-
python3.11-idle-3.11.2-2.el9_2.2.tuxcare.els14.x86_64.rpm
sha:bb028ad0f96520704c92861cdcfc64a5adb192b4c524db83fd9f0158b706364a
-
python3.11-libs-3.11.2-2.el9_2.2.tuxcare.els14.i686.rpm
sha:5cc0ac20a06c90982b73b69604380b230b583492b8a0b82bb1b0c8c68ef9cf5e
-
python3.11-libs-3.11.2-2.el9_2.2.tuxcare.els14.x86_64.rpm
sha:cf001f863ec4f602049df28042cd88d03ced1746a47cb7d13bd9b4b69d273c6a
-
python3.11-test-3.11.2-2.el9_2.2.tuxcare.els14.i686.rpm
sha:1f00d89073a2aefebe30e49ab3caecfc94893d63181ed5a8f98210c9d0f2aba3
-
python3.11-test-3.11.2-2.el9_2.2.tuxcare.els14.x86_64.rpm
sha:150f2ba713eb6709b5937bfabcb6e7163e71e2ce1a211e5ad55bb8626bc4e69d
-
python3.11-tkinter-3.11.2-2.el9_2.2.tuxcare.els14.i686.rpm
sha:1625b3b32e390ec01c7754a87202439d8660f1d893b2415697506658147c61d8
-
python3.11-tkinter-3.11.2-2.el9_2.2.tuxcare.els14.x86_64.rpm
sha:ef07b26afe203668ca7fe236336caecf17b5c1085dabb55a7188d4c889bb9bcc
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.