Bug 2418655 (CVE-2025-12084) - CVE-2025-12084 cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
Summary: CVE-2025-12084 cpython: python: cpython: Quadratic algorithm in xml.dom.minid...
Keywords:
Status: NEW
Alias: CVE-2025-12084
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2421616 2421633 2422516 2422518 2422521 2422524 2421608 2421612 2421614 2421620 2421623 2421625 2421628 2421630 2421636 2421639 2421642 2422517 2422519 2422520 2422522
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-12-03 19:01 UTC by OSIDB Bzimport
Modified: 2026-01-29 14:28 UTC (History)
15 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:0123 0 None None None 2026-01-06 10:37:25 UTC
Red Hat Product Errata RHSA-2026:1374 0 None None None 2026-01-27 15:10:58 UTC
Red Hat Product Errata RHSA-2026:1408 0 None None None 2026-01-27 17:17:45 UTC
Red Hat Product Errata RHSA-2026:1410 0 None None None 2026-01-27 17:23:36 UTC
Red Hat Product Errata RHSA-2026:1478 0 None None None 2026-01-28 10:33:34 UTC
Red Hat Product Errata RHSA-2026:1537 0 None None None 2026-01-29 07:05:06 UTC
Red Hat Product Errata RHSA-2026:1558 0 None None None 2026-01-29 09:36:38 UTC
Red Hat Product Errata RHSA-2026:1582 0 None None None 2026-01-29 14:19:44 UTC
Red Hat Product Errata RHSA-2026:1583 0 None None None 2026-01-29 14:28:59 UTC

Description OSIDB Bzimport 2025-12-03 19:01:30 UTC
When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

Comment 2 errata-xmlrpc 2026-01-06 10:37:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:0123 https://access.redhat.com/errata/RHSA-2026:0123

Comment 4 errata-xmlrpc 2026-01-27 15:10:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:1374 https://access.redhat.com/errata/RHSA-2026:1374

Comment 5 errata-xmlrpc 2026-01-27 17:17:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1408 https://access.redhat.com/errata/RHSA-2026:1408

Comment 6 errata-xmlrpc 2026-01-27 17:23:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1410 https://access.redhat.com/errata/RHSA-2026:1410

Comment 7 errata-xmlrpc 2026-01-28 10:33:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1478 https://access.redhat.com/errata/RHSA-2026:1478

Comment 8 errata-xmlrpc 2026-01-29 07:05:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2026:1537 https://access.redhat.com/errata/RHSA-2026:1537

Comment 9 errata-xmlrpc 2026-01-29 09:36:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:1558 https://access.redhat.com/errata/RHSA-2026:1558

Comment 11 errata-xmlrpc 2026-01-29 14:19:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:1582 https://access.redhat.com/errata/RHSA-2026:1582

Comment 12 errata-xmlrpc 2026-01-29 14:28:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:1583 https://access.redhat.com/errata/RHSA-2026:1583


Note You need to log in before you can comment on or make changes to this bug.