When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:1374 https://access.redhat.com/errata/RHSA-2026:1374
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:1408 https://access.redhat.com/errata/RHSA-2026:1408
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:1410 https://access.redhat.com/errata/RHSA-2026:1410
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:1828 https://access.redhat.com/errata/RHSA-2026:1828
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:1922 https://access.redhat.com/errata/RHSA-2026:1922
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:1892 https://access.redhat.com/errata/RHSA-2026:1892
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:1893 https://access.redhat.com/errata/RHSA-2026:1893
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions Red Hat Enterprise Linux 8.8 Telecommunications Update Service Via RHSA-2026:2084 https://access.redhat.com/errata/RHSA-2026:2084