Release date:
2026-01-15 12:34:34 UTC
Description:
- CVE-2025-13836: fixed memory exhaustion vulnerability when reading HTTP
responses with malicious Content-Length headers
Updated packages:
-
python3.11-3.11.11-2.el9_6.2.tuxcare.els1.i686.rpm
sha:70db39435d25c69c2c284559720bc5b0dd75e8b51bfcc20e7d6a384a6c324692
-
python3.11-3.11.11-2.el9_6.2.tuxcare.els1.x86_64.rpm
sha:6d887d6f8120d1563c12eaa6ba13fd2044b387caa0eea21171a4e7e5a46ff0f3
-
python3.11-debug-3.11.11-2.el9_6.2.tuxcare.els1.i686.rpm
sha:2e1dc2609c20351694bfafdafd61f5a4af6f96bd1ba4fe92bdbe20ddf8ec2d38
-
python3.11-debug-3.11.11-2.el9_6.2.tuxcare.els1.x86_64.rpm
sha:66bdf10f25e968de469e65452637b6bcdc112c57cca6a4b97d05d38676f12fdc
-
python3.11-devel-3.11.11-2.el9_6.2.tuxcare.els1.i686.rpm
sha:bbbf790e08e453f0d215f3a4b9f6c12bcc04c116067bd61d448884295d1dfb6f
-
python3.11-devel-3.11.11-2.el9_6.2.tuxcare.els1.x86_64.rpm
sha:dabca40b6bac5d673f73200e58fba3ebdb6c7217b3905556c6290516168e6ff7
-
python3.11-idle-3.11.11-2.el9_6.2.tuxcare.els1.i686.rpm
sha:47e75ff6c773c0c6a4159ef0d3ec37037d4b63fc4dda61a9c8f944825778db2e
-
python3.11-idle-3.11.11-2.el9_6.2.tuxcare.els1.x86_64.rpm
sha:12a4f9674756c4b84b2d5aa2e46d620c9e122f6530571d827c2e49097b3e3358
-
python3.11-libs-3.11.11-2.el9_6.2.tuxcare.els1.i686.rpm
sha:6f2790fa4d4ac22735f404533841440b5cfa72bc3f3339956606da1a15143171
-
python3.11-libs-3.11.11-2.el9_6.2.tuxcare.els1.x86_64.rpm
sha:614bac399e7ea9cbc2dbbdd9d4b55a607d5b9e0c169f5ee1e9c7755093e4e45b
-
python3.11-test-3.11.11-2.el9_6.2.tuxcare.els1.i686.rpm
sha:e796a835cf846a102895fc1092fa859b3c4641b2750115c21e42539b891217a5
-
python3.11-test-3.11.11-2.el9_6.2.tuxcare.els1.x86_64.rpm
sha:19ce87f1623d0d3c539956cff34d9594beafde52d3b9e465b687a826915f01c9
-
python3.11-tkinter-3.11.11-2.el9_6.2.tuxcare.els1.i686.rpm
sha:cb516027644323fe6c119b24c023ce05412176314da97baa8ad46027146c2979
-
python3.11-tkinter-3.11.11-2.el9_6.2.tuxcare.els1.x86_64.rpm
sha:ee79b58562178e57de8e3b5908d2569378da8caacf0b8f2841138bccbd64f50c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.