Описание
ELSA-2026-2419: python3.12 security update (MODERATE)
[3.12.12-2]
- Security fix for CVE-2025-13836 Resolves: RHEL-140993
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
python3.12
3.12.12-2.el8_10
python3.12-debug
3.12.12-2.el8_10
python3.12-devel
3.12.12-2.el8_10
python3.12-idle
3.12.12-2.el8_10
python3.12-libs
3.12.12-2.el8_10
python3.12-rpm-macros
3.12.12-2.el8_10
python3.12-test
3.12.12-2.el8_10
python3.12-tkinter
3.12.12-2.el8_10
Oracle Linux x86_64
python3.12
3.12.12-2.el8_10
python3.12-debug
3.12.12-2.el8_10
python3.12-devel
3.12.12-2.el8_10
python3.12-idle
3.12.12-2.el8_10
python3.12-libs
3.12.12-2.el8_10
python3.12-rpm-macros
3.12.12-2.el8_10
python3.12-test
3.12.12-2.el8_10
python3.12-tkinter
3.12.12-2.el8_10
Связанные CVE
Связанные уязвимости
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
When reading an HTTP response from a server, if no read amount is spec ...