Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-0930

Опубликовано: 21 янв. 2026
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2026-0930: pcs security update (MODERATE)

[0.10.18-2.0.1.el8_10.8]

  • Replaced HAM-logo

[0.10.18]

  • Debrand PCS

[0.10.18-2.el8_10.8]

  • Fixed CVE-2025-67725, CVE-2025-67726 by patching bundled Tornado Resolves: RHEL-136415, RHEL-136420

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

pcs

0.10.18-2.0.1.el8_10.8

pcs-snmp

0.10.18-2.0.1.el8_10.8

Oracle Linux x86_64

pcs

0.10.18-2.0.1.el8_10.8

pcs-snmp

0.10.18-2.0.1.el8_10.8

Связанные CVE

Связанные уязвимости

suse-cvrf
18 дней назад

Security update for python-tornado

suse-cvrf
28 дней назад

Security update for python-tornado6

suse-cvrf
около 1 месяца назад

Security update for python-tornado6

CVSS3: 7.5
ubuntu
около 2 месяцев назад

Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.

CVSS3: 7.5
nvd
около 2 месяцев назад

Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.