Allocation of Resources Without Limits or Throttling Affecting airflow package, versions <2.10.5-r44


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.14% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-AIRFLOW-10186816
  • published21 May 2025
  • disclosed15 May 2025

Introduced: 15 May 2025

CVE-2025-47287  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade Chainguard airflow to version 2.10.5-r44 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream airflow package and not the airflow package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Tornado is a Python web framework and asynchronous networking library. When Tornado's multipart/form-data parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking Content-Type: multipart/form-data in a proxy.

CVSS Base Scores

version 3.1