Security update for python-tornado
| Announcement ID: | SUSE-SU-2026:1162-1 |
|---|---|
| Release Date: | 2026-03-31T22:02:19Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves three vulnerabilities and has one security fix can now be installed.
Description:
This update for python-tornado fixes the following issues:
- CVE-2025-67724: missing validation of the supplied reason phrase (bsc#1254903).
- CVE-2025-67725: Denial of Service (DoS) via maliciously crafted HTTP request caused by the HTTPHeaders.add method (bsc#1254905).
- CVE-2026-31958: parsing large multipart bodies with many parts can cause a denial of service (bsc#1259553).
- incomplete validation of cookie attributes allows for injection of user-controlled values in other cookie attributes (bsc#1259630).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Manager Client Tools for SLE 12
zypper in -t patch SUSE-SLE-Manager-Tools-12-2026-1162=1
Package List:
-
SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64)
- python3-tornado-4.2.1-17.18.1
- python-tornado-debuginfo-4.2.1-17.18.1
- python-tornado-debugsource-4.2.1-17.18.1
- python-tornado-4.2.1-17.18.1
References:
- https://www.suse.com/security/cve/CVE-2025-67724.html
- https://www.suse.com/security/cve/CVE-2025-67725.html
- https://www.suse.com/security/cve/CVE-2026-31958.html
- https://bugzilla.suse.com/show_bug.cgi?id=1254903
- https://bugzilla.suse.com/show_bug.cgi?id=1254905
- https://bugzilla.suse.com/show_bug.cgi?id=1259553
- https://bugzilla.suse.com/show_bug.cgi?id=1259630