FERRAMENTAS LINUX: Critical Security Update: Python-Tornado Vulnerability (CVE-2025-47287) Patched

quinta-feira, 29 de maio de 2025

Critical Security Update: Python-Tornado Vulnerability (CVE-2025-47287) Patched

 

SUSE

SUSE has issued an urgent security update for Python-Tornado (CVE-2025-47287) to patch a high-severity DoS vulnerability affecting multipart/form-data parsing. Learn which enterprise Linux systems are impacted and how to apply fixes.

SUSE Releases High-Priority Fix for Denial-of-Service Risk

Severity and Impact

CVSS 8.7 (Critical) – This vulnerability (CVE-2025-47287) allows remote attackers to trigger excessive logging via malformed multipart/form-data requests, leading to denial-of-service (DoS) conditions. Affected systems include:

  • SUSE Linux Enterprise Server 15 SP3-SP6

  • SUSE Manager 4.3

  • SUSE Enterprise Storage 7.1

  • High-Performance Computing (HPC) deployments

Why This Matters for Enterprises:

  • Targets web servers using Python-Tornado for form processing.

  • Exploitable remotely without authentication (CVSS:4.0 AV:N/PR:N).

  • Patches are urgent for systems handling user uploads or API requests.


Patch Instructions

Recommended Methods

  1. Automated Update: Use zypper patch or YaST Online Update.

  2. Manual Commands:

    bash
    Copy
    Download
    # Example for SUSE Linux Enterprise 15 SP6:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1726=1

Affected Packages:

  • python3-tornado (v4.5.3-150000.3.10.1)

  • Debug symbols for troubleshooting.


Technical Deep Dive

Root Cause

The flaw stems from unbounded logging during malformed multipart/form-data parsing, exhausting disk I/O or storage.

Mitigation Strategies:

  • Apply patches immediately.

  • Monitor logs for abnormal HTTP POST activity.

  • Consider rate-limiting form submissions.

Enterprise Implications:

  • SAP Applications: Critical for SUSE Linux Enterprise Server for SAP.

  • Cloud Environments: Affects MicroOS/Rancher deployments.


FAQs

Q: Is this vulnerability actively exploited?

A: No public exploits yet, but PoCs are likely due to high CVSS scores.

Q: Are containerized deployments affected?

A: Yes, if using vulnerable Python-Tornado versions.

Q: How to verify patch success?
A: Check package version: rpm -q python3-tornado.


Nenhum comentário:

Postar um comentário