Source: python-tornado
Version: 6.4.2-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for python-tornado.

CVE-2025-47287[0]:
| Tornado is a Python web framework and asynchronous networking
| library. When Tornado's ``multipart/form-data`` parser encounters
| certain errors, it logs a warning but continues trying to parse the
| remainder of the data. This allows remote attackers to generate an
| extremely high volume of logs, constituting a DoS attack. This DoS
| is compounded by the fact that the logging subsystem is synchronous.
| All versions of Tornado prior to 6.5.0 are affected. The vulnerable
| parser is enabled by default. Upgrade to Tornado version 6.50 to
| receive a patch. As a workaround, risk can be mitigated by blocking
| `Content-Type: multipart/form-data` in a proxy.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-47287
    https://www.cve.org/CVERecord?id=CVE-2025-47287
[1] 
https://github.com/tornadoweb/tornado/security/advisories/GHSA-7cx3-6m66-7c5m
[2] 
https://github.com/tornadoweb/tornado/commit/b39b892bf78fe8fea01dd45199aa88307e7162f3

Please adjust the affected versions in the BTS as needed, all versions
before 6.5.0 should be affected.

Regards,
Salvatore

Reply via email to