{"affected":[{"ecosystem_specific":{"binaries":[{"python313-tornado6":"6.5-160000.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 16.0","name":"python-tornado6","purl":"pkg:rpm/opensuse/python-tornado6&distro=openSUSE%20Leap%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.5-160000.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-tornado6 fixes the following issues:\n\n- CVE-2025-67724: unescaped `reason` argument used in HTTP headers and in HTML default error pages can be used by\n  attackers to launch header injection or XSS attacks (bsc#1254903).\n- CVE-2025-67725: quadratic complexity of string concatenation operations used by the `HTTPHeaders.add` method can lead\n  o DoS when processing a maliciously crafted HTTP request (bsc#1254905).\n- CVE-2025-67726: quadratic complexity algorithm used in the `_parseparam` function of `httputil.py` can lead to DoS\n  when processing maliciously crafted parameters in a `Content-Disposition` header (bsc#1254904).\n","id":"openSUSE-SU-2026:20015-1","modified":"2026-01-12T10:29:37Z","published":"2026-01-12T10:29:37Z","references":[{"type":"ADVISORY","url":null},{"type":"REPORT","url":"https://bugzilla.suse.com/1254903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-67724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-67725"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-67726"}],"related":["CVE-2025-67724","CVE-2025-67725","CVE-2025-67726"],"summary":"Security update for python-tornado6","upstream":["CVE-2025-67724","CVE-2025-67725","CVE-2025-67726"]}