{"affected":[{"ecosystem_specific":{"binaries":[{"python311-tornado6":"6.4-slfo.1.1_3.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"python-tornado6","purl":"pkg:rpm/suse/python-tornado6&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4-slfo.1.1_3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-tornado6 fixes the following issues:\n\n- CVE-2025-67724: unescaped `reason` argument used in HTTP headers and in HTML default error pages can be used by\n  attackers to launch header injection or XSS attacks (bsc#1254903).\n- CVE-2025-67725: quadratic complexity of string concatenation operations used by the `HTTPHeaders.add` method can lead\n  to DoS when processing a maliciously crafted HTTP request (bsc#1254905).\n- CVE-2025-67726: quadratic complexity algorithm used in the `_parseparam` function of `httputil.py` can lead to DoS\n  when processing maliciously crafted parameters in a `Content-Disposition` header (bsc#1254904).\n","id":"SUSE-SU-2026:20007-1","modified":"2025-12-22T13:31:07Z","published":"2025-12-22T13:31:07Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620007-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-67724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-67725"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-67726"}],"related":["CVE-2025-67724","CVE-2025-67725","CVE-2025-67726"],"summary":"Security update for python-tornado6","upstream":["CVE-2025-67724","CVE-2025-67725","CVE-2025-67726"]}