Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-8664

Опубликовано: 02 июл. 2025
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2025-8664: python-tornado security update (IMPORTANT)

[4.2.1-5.0.1]

  • Fixed CVE-2025-47287 Raise errors instead of logging [Orabug: 38049949]

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

python-tornado

4.2.1-5.0.1.el7

python-tornado-doc

4.2.1-5.0.1.el7

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
3 месяца назад

Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.

CVSS3: 7.5
redhat
3 месяца назад

Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.

CVSS3: 7.5
nvd
3 месяца назад

Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.

CVSS3: 7.5
debian
3 месяца назад

Tornado is a Python web framework and asynchronous networking library. ...

suse-cvrf
2 месяца назад

Security update for python-tornado