vulnerability

Rocky Linux: CVE-2025-66418: python-urllib3 (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Feb 11, 2026
Added
Feb 13, 2026
Modified
Mar 31, 2026

Description

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.

Solutions

rocky-upgrade-fence-agents-aliyunrocky-upgrade-fence-agents-aliyun-debuginforocky-upgrade-fence-agents-allrocky-upgrade-fence-agents-awsrocky-upgrade-fence-agents-azure-armrocky-upgrade-fence-agents-azure-arm-debuginforocky-upgrade-fence-agents-computerocky-upgrade-fence-agents-debuginforocky-upgrade-fence-agents-debugsourcerocky-upgrade-fence-agents-gcerocky-upgrade-fence-agents-kdumprocky-upgrade-fence-agents-kdump-debuginforocky-upgrade-fence-agents-kubevirtrocky-upgrade-fence-agents-kubevirt-debuginforocky-upgrade-fence-agents-openstackrocky-upgrade-fence-agents-redfishrocky-upgrade-fence-agents-zvmrocky-upgrade-fence-virtrocky-upgrade-fence-virt-debuginforocky-upgrade-fence-virtdrocky-upgrade-fence-virtd-cpgrocky-upgrade-fence-virtd-cpg-debuginforocky-upgrade-fence-virtd-debuginforocky-upgrade-fence-virtd-libvirtrocky-upgrade-fence-virtd-libvirt-debuginforocky-upgrade-fence-virtd-multicastrocky-upgrade-fence-virtd-multicast-debuginforocky-upgrade-fence-virtd-serialrocky-upgrade-fence-virtd-serial-debuginforocky-upgrade-fence-virtd-tcprocky-upgrade-fence-virtd-tcp-debuginforocky-upgrade-ha-cloud-supportrocky-upgrade-ha-cloud-support-debuginforocky-upgrade-resource-agentsrocky-upgrade-resource-agents-aliyunrocky-upgrade-resource-agents-aliyun-debuginforocky-upgrade-resource-agents-debuginforocky-upgrade-resource-agents-debugsourcerocky-upgrade-resource-agents-gcprocky-upgrade-resource-agents-paf

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.