RHSA-2026:0930

Vulnerability from csaf_redhat - Published: 2026-01-21 15:59 - Updated: 2026-01-21 23:06
Summary
Red Hat Security Advisory: pcs security update

Notes

Topic
An update for pcs is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Security Fix(es): * tornado: Tornado Quadratic DoS via Repeated Header Coalescing (CVE-2025-67725) * tornado: Tornado Quadratic DoS via Crafted Multipart Parameters (CVE-2025-67726) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for pcs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.\n\nSecurity Fix(es):\n\n* tornado: Tornado Quadratic DoS via Repeated Header Coalescing (CVE-2025-67725)\n\n* tornado: Tornado Quadratic DoS via Crafted Multipart Parameters (CVE-2025-67726)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:0930",
        "url": "https://access.redhat.com/errata/RHSA-2026:0930"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2421722",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421722"
      },
      {
        "category": "external",
        "summary": "2421733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421733"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0930.json"
      }
    ],
    "title": "Red Hat Security Advisory: pcs security update",
    "tracking": {
      "current_release_date": "2026-01-21T23:06:11+00:00",
      "generator": {
        "date": "2026-01-21T23:06:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.15"
        }
      },
      "id": "RHSA-2026:0930",
      "initial_release_date": "2026-01-21T15:59:50+00:00",
      "revision_history": [
        {
          "date": "2026-01-21T15:59:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-01-21T15:59:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-01-21T23:06:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
                  "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::highavailability"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
                  "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::resilientstorage"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pcs-0:0.10.18-2.el8_10.8.src",
                "product": {
                  "name": "pcs-0:0.10.18-2.el8_10.8.src",
                  "product_id": "pcs-0:0.10.18-2.el8_10.8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs@0.10.18-2.el8_10.8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pcs-0:0.10.18-2.el8_10.8.aarch64",
                "product": {
                  "name": "pcs-0:0.10.18-2.el8_10.8.aarch64",
                  "product_id": "pcs-0:0.10.18-2.el8_10.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs@0.10.18-2.el8_10.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
                "product": {
                  "name": "pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
                  "product_id": "pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs-snmp@0.10.18-2.el8_10.8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pcs-0:0.10.18-2.el8_10.8.ppc64le",
                "product": {
                  "name": "pcs-0:0.10.18-2.el8_10.8.ppc64le",
                  "product_id": "pcs-0:0.10.18-2.el8_10.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs@0.10.18-2.el8_10.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
                "product": {
                  "name": "pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
                  "product_id": "pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs-snmp@0.10.18-2.el8_10.8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pcs-0:0.10.18-2.el8_10.8.x86_64",
                "product": {
                  "name": "pcs-0:0.10.18-2.el8_10.8.x86_64",
                  "product_id": "pcs-0:0.10.18-2.el8_10.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs@0.10.18-2.el8_10.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
                "product": {
                  "name": "pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
                  "product_id": "pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs-snmp@0.10.18-2.el8_10.8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pcs-0:0.10.18-2.el8_10.8.s390x",
                "product": {
                  "name": "pcs-0:0.10.18-2.el8_10.8.s390x",
                  "product_id": "pcs-0:0.10.18-2.el8_10.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs@0.10.18-2.el8_10.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
                "product": {
                  "name": "pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
                  "product_id": "pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcs-snmp@0.10.18-2.el8_10.8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.aarch64",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.ppc64le",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.s390x",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.src as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.src",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.x86_64",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-snmp-0:0.10.18-2.el8_10.8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64"
        },
        "product_reference": "pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le"
        },
        "product_reference": "pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-snmp-0:0.10.18-2.el8_10.8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x"
        },
        "product_reference": "pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-snmp-0:0.10.18-2.el8_10.8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
          "product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
        },
        "product_reference": "pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
        "relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.aarch64",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.ppc64le",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.s390x",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.src as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.src",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-0:0.10.18-2.el8_10.8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64"
        },
        "product_reference": "pcs-0:0.10.18-2.el8_10.8.x86_64",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-snmp-0:0.10.18-2.el8_10.8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64"
        },
        "product_reference": "pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le"
        },
        "product_reference": "pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-snmp-0:0.10.18-2.el8_10.8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x"
        },
        "product_reference": "pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcs-snmp-0:0.10.18-2.el8_10.8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
          "product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
        },
        "product_reference": "pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
        "relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-67725",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2025-12-12T09:44:25.333328+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2421722"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, a single maliciously crafted HTTP request can block the server\u0027s event loop for an extended period, caused by the HTTPHeaders.add method. The function accumulates values using string concatenation when the same header name is repeated, causing a Denial of Service (DoS).  Due to Python string immutability, each concatenation copies the entire string, resulting in O(n\u00b2) time complexity. The severity can vary from high if max_header_size has been increased from its default, to low if it has its default value of 64KB. This issue is fixed in version 6.5.3.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tornado: Tornado Quadratic DoS via Repeated Header Coalescing",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The availability impact of this flaw is partially mitigated on Red Hat products as the host systems are not at risk.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-67725"
        },
        {
          "category": "external",
          "summary": "RHBZ#2421722",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421722"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-67725",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-67725"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-67725",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67725"
        },
        {
          "category": "external",
          "summary": "https://github.com/tornadoweb/tornado/commit/771472cfdaeebc0d89a9cc46e249f8891a6b29cd",
          "url": "https://github.com/tornadoweb/tornado/commit/771472cfdaeebc0d89a9cc46e249f8891a6b29cd"
        },
        {
          "category": "external",
          "summary": "https://github.com/tornadoweb/tornado/releases/tag/v6.5.3",
          "url": "https://github.com/tornadoweb/tornado/releases/tag/v6.5.3"
        },
        {
          "category": "external",
          "summary": "https://github.com/tornadoweb/tornado/security/advisories/GHSA-c98p-7wgm-6p64",
          "url": "https://github.com/tornadoweb/tornado/security/advisories/GHSA-c98p-7wgm-6p64"
        }
      ],
      "release_date": "2025-12-12T05:49:41.523000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-21T15:59:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:0930"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tornado: Tornado Quadratic DoS via Repeated Header Coalescing"
    },
    {
      "cve": "CVE-2025-67726",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "discovery_date": "2025-12-12T09:45:15.366983+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2421733"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server\u0027s CPU usage increases quadratically (O(n\u00b2)) during parsing. Due to Tornado\u0027s single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tornado: Tornado Quadratic DoS via Crafted Multipart Parameters",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The availability impact of this flaw is partially mitigated on Red Hat products as the host systems are not at risk.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
          "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
          "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-67726"
        },
        {
          "category": "external",
          "summary": "RHBZ#2421733",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421733"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-67726",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-67726"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-67726",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67726"
        },
        {
          "category": "external",
          "summary": "https://github.com/tornadoweb/tornado/commit/771472cfdaeebc0d89a9cc46e249f8891a6b29cd",
          "url": "https://github.com/tornadoweb/tornado/commit/771472cfdaeebc0d89a9cc46e249f8891a6b29cd"
        },
        {
          "category": "external",
          "summary": "https://github.com/tornadoweb/tornado/releases/tag/v6.5.3",
          "url": "https://github.com/tornadoweb/tornado/releases/tag/v6.5.3"
        },
        {
          "category": "external",
          "summary": "https://github.com/tornadoweb/tornado/security/advisories/GHSA-jhmp-mqwm-3gq8",
          "url": "https://github.com/tornadoweb/tornado/security/advisories/GHSA-jhmp-mqwm-3gq8"
        }
      ],
      "release_date": "2025-12-12T06:13:51.336000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-21T15:59:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:0930"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "HighAvailability-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.src",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-0:0.10.18-2.el8_10.8.x86_64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.aarch64",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.ppc64le",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.s390x",
            "ResilientStorage-8.10.0.Z.MAIN.EUS:pcs-snmp-0:0.10.18-2.el8_10.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tornado: Tornado Quadratic DoS via Crafted Multipart Parameters"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…