{"id":"USN-8198-2","summary":"python-tornado vulnerabilities","details":"USN-8198-1 fixed vulnerabilities in Tornado. This update provides the\ncorresponding updates for Ubuntu 26.04 LTS.\n\nOriginal advisory details:\n\n It was discovered that Tornado incorrectly handled parsing of large\n multipart request bodies. An attacker could possibly use this issue to\n cause a denial of service. (CVE-2026-31958)\n\n It was discovered that Tornado did not properly validate characters in\n cookie values. An attacker could possibly use this issue to inject\n arbitrary cookie attributes. (CVE-2026-35536)","modified":"2026-04-29T11:44:21.197569368Z","published":"2026-04-28T19:27:53Z","related":["UBUNTU-CVE-2026-31958","UBUNTU-CVE-2026-35536"],"upstream":["CVE-2026-31958","CVE-2026-35536","UBUNTU-CVE-2026-31958","UBUNTU-CVE-2026-35536"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8198-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-31958"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-35536"}],"affected":[{"package":{"name":"python-tornado","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/python-tornado@6.5.4-0.1ubuntu0.1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.5.4-0.1ubuntu0.1"}]}],"versions":["6.4.2-3","6.5.2-3","6.5.4-0.1"],"ecosystem_specific":{"binaries":[{"binary_version":"6.5.4-0.1ubuntu0.1","binary_name":"python3-tornado"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8198-2.json","cves_map":{"ecosystem":"Ubuntu:26.04","cves":[{"id":"CVE-2026-31958","severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2026-35536","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}