Name | CVE-2025-6069 |
Description | The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
jython (PTS) | bullseye | 2.7.2+repack1-3 | vulnerable |
| bookworm, sid, trixie | 2.7.3+repack1-1 | vulnerable |
python2.7 (PTS) | bullseye | 2.7.18-8+deb11u1 | vulnerable |
python3.11 (PTS) | bookworm | 3.11.2-6+deb12u6 | vulnerable |
| bookworm (security) | 3.11.2-6+deb12u3 | vulnerable |
python3.12 (PTS) | sid | 3.12.10-1 | vulnerable |
python3.13 (PTS) | trixie | 3.13.3-2 | vulnerable |
| sid | 3.13.5-1 | vulnerable |
python3.9 (PTS) | bullseye | 3.9.2-1 | vulnerable |
| bullseye (security) | 3.9.2-1+deb11u3 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - python3.11 <no-dsa> (Minor issue)
[bullseye] - python3.9 <postponed> (Minor issue; can be fixed in next update)
[bullseye] - python2.7 <end-of-life> (EOL in bullseye LTS)
[bookworm] - jython <no-dsa> (Minor issue)
[bullseye] - jython <end-of-life> (EOL in bullseye LTS)
https://mail.python.org/archives/list/security-announce@python.org/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
https://github.com/python/cpython/issues/135462
https://github.com/python/cpython/pull/135464
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 (main)
https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b (v3.14.0b3)
https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949 (3.13-branch)