Source: python-tornado
Version: 6.5.4-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-tornado.

CVE-2026-31958[0]:
| Tornado is a Python web framework and asynchronous networking
| library. In versions of Tornado prior to 6.5.5, the only limit on
| the number of parts in multipart/form-data is the max_body_size
| setting (default 100MB). Since parsing occurs synchronously on the
| main thread, this creates the possibility of denial-of-service due
| to the cost of parsing very large multipart bodies with many parts.
| This vulnerability is fixed in 6.5.5.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-31958
    https://www.cve.org/CVERecord?id=CVE-2026-31958
[]1 
https://github.com/tornadoweb/tornado/security/advisories/GHSA-qjxf-f2mg-c6mc

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to