CVE Vulnerabilities

CVE-2025-6075

Uncontrolled Resource Consumption

Published: Oct 31, 2025 | Modified: Dec 01, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4 LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 8RedHatpython39:3.9-8100020251126112422.d47b87a4*
Red Hat Enterprise Linux 8RedHatpython39-devel:3.9-8100020251126112422.d47b87a4*
Red Hat Enterprise Linux 9RedHatpython3.9-0:3.9.25-2.el9_7*
Red Hat Enterprise Linux 9RedHatpython3.9-0:3.9.25-2.el9_7*
Red Hat Discovery 2RedHatdiscovery/discovery-server-rhel9:sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf*
Red Hat Discovery 2RedHatdiscovery/discovery-ui-rhel9:sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee*
Red Hat Update Infrastructure 5RedHatrhui5/cds-rhel9:sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be*
Red Hat Update Infrastructure 5RedHatrhui5/haproxy-rhel9:sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16*
Red Hat Update Infrastructure 5RedHatrhui5/installer-rhel9:sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9*
Red Hat Update Infrastructure 5RedHatrhui5/rhua-rhel9:sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2*
Pypy3Ubuntuplucky*
Python3.10Ubuntujammy*
Python3.11Ubuntuesm-apps/jammy*
Python3.11Ubuntujammy*
Python3.12Ubuntunoble*
Python3.13Ubuntuplucky*
Python3.13Ubuntuupstream*
Python3.14Ubuntuupstream*
Python3.4Ubuntuesm-infra-legacy/trusty*
Python3.5Ubuntuesm-infra-legacy/trusty*
Python3.5Ubuntuesm-infra/xenial*
Python3.6Ubuntuesm-infra/bionic*
Python3.7Ubuntuesm-apps/bionic*
Python3.8Ubuntuesm-apps/bionic*
Python3.8Ubuntuesm-infra/focal*
Python3.9Ubuntuesm-apps/focal*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References