Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-31650 (GCVE-0-2025-31650)
Vulnerability from cvelistv5
- CWE-459 - Incomplete Cleanup
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tomcat |
Version: 9.0.76 ≤ 9.0.102 Version: 10.1.10 ≤ 10.1.39 Version: 11.0.0-M2 ≤ 11.0.5 Version: 8.5.90 ≤ 8.5.100 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-04-28T22:02:46.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/04/28/2" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-31650", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T20:07:38.530859Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T20:07:50.531Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Tomcat", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "9.0.102", "status": "affected", "version": "9.0.76", "versionType": "semver" }, { "lessThanOrEqual": "10.1.39", "status": "affected", "version": "10.1.10", "versionType": "semver" }, { "lessThanOrEqual": "11.0.5", "status": "affected", "version": "11.0.0-M2", "versionType": "semver" }, { "lessThanOrEqual": "8.5.100", "status": "affected", "version": "8.5.90", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eImproper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.\u003cbr\u003eThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.90 though 8.5.100.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\n\nThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.90 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue." } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459 Incomplete Cleanup", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-08T11:43:00.251Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2025-31650", "datePublished": "2025-04-28T19:14:31.107Z", "dateReserved": "2025-03-31T12:13:57.705Z", "dateUpdated": "2025-08-08T11:43:00.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-31650\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-04-28T20:15:20.653\",\"lastModified\":\"2025-08-08T12:15:27.817\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\\n\\nThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.\\nThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.90 though 8.5.100.\\n\\n\\nUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Tomcat. La gesti\u00f3n incorrecta de errores en algunos encabezados de prioridad HTTP no v\u00e1lidos provoc\u00f3 una limpieza incompleta de la solicitud fallida, lo que gener\u00f3 una fuga de memoria. Un gran n\u00famero de solicitudes de este tipo podr\u00eda generar una excepci\u00f3n OutOfMemoryException, lo que resulta en una denegaci\u00f3n de servicio. Este problema afecta a Apache Tomcat: de la 9.0.76 a la 9.0.102, de la 10.1.10 a la 10.1.39 y de la 11.0.0-M2 a la 11.0.5. Se recomienda actualizar a las versiones 9.0.104, 10.1.40 o 11.0.6, que solucionan el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-459\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-459\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.76\",\"versionEndExcluding\":\"9.0.104\",\"matchCriteriaId\":\"6F4F87EB-0046-4BAA-91C8-C60C60425186\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1.10\",\"versionEndExcluding\":\"10.1.40\",\"matchCriteriaId\":\"7EC8AA6F-0BB4-4075-8F2B-DE39FD9A2BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.1\",\"versionEndExcluding\":\"11.0.6\",\"matchCriteriaId\":\"45AB4386-DB38-4808-924A-617CECE9F939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*\",\"matchCriteriaId\":\"57088BDD-A136-45EF-A8A1-2EBF79CEC2CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*\",\"matchCriteriaId\":\"B32D1D7A-A04F-444E-8F45-BB9A9E4B0199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0092FB35-3B00-484F-A24D-7828396A4FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB557E88-FA9D-4B69-AA6F-EAEE7F9B01AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:*\",\"matchCriteriaId\":\"72D3C6F1-84FA-4F82-96C1-9A8DA1C1F30F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:*\",\"matchCriteriaId\":\"3521C81B-37D9-48FC-9540-D0D333B9A4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:*\",\"matchCriteriaId\":\"02A84634-A8F2-4BA9-B9F3-BEF36AEC5480\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone17:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBBC1F1-C86B-40AF-B740-A99F6B27682A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone18:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2206B2-F3FF-43F2-B3E2-3CAAC64C691D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone19:*:*:*:*:*:*\",\"matchCriteriaId\":\"0495A538-4102-40D0-A35C-0179CFD52A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAD52CE-94F5-4F98-A027-9A7E68818CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone20:*:*:*:*:*:*\",\"matchCriteriaId\":\"77BA6600-0890-4BA1-B447-EC1746BAB4FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone21:*:*:*:*:*:*\",\"matchCriteriaId\":\"7914D26B-CBD6-4846-9BD3-403708D69319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone22:*:*:*:*:*:*\",\"matchCriteriaId\":\"123C6285-03BE-49FC-B821-8BDB25D02863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A28C2E2-B7BC-46CE-94E4-AE3EF172AA47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:*\",\"matchCriteriaId\":\"069B0D8E-8223-4C4E-A834-C6235D6C3450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6282085-5716-4874-B0B0-180ECDEE128F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"03A171AF-2EC8-4422-912C-547CDB58CAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"538E68C4-0BA4-495F-AEF8-4EF6EE7963CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"49350A6E-5E1D-45B2-A874-3B8601B3ADCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F50942F-DF54-46C0-8371-9A476DD3EEA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"98792138-DD56-42DF-9612-3BDC65EEC117\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/04/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/04/28/2\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-04-28T22:02:46.448Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-31650\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-06T20:07:38.530859Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-06T20:07:13.015Z\"}}], \"cna\": {\"title\": \"Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"important\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Tomcat\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.76\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.0.102\"}, {\"status\": \"affected\", \"version\": \"10.1.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"10.1.39\"}, {\"status\": \"affected\", \"version\": \"11.0.0-M2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.0.5\"}, {\"status\": \"affected\", \"version\": \"8.5.90\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.100\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\\n\\nThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.\\nThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.90 though 8.5.100.\\n\\n\\nUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eImproper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.\u003cbr\u003eThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.90 though 8.5.100.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-459\", \"description\": \"CWE-459 Incomplete Cleanup\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-08-08T11:43:00.251Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-31650\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-08T11:43:00.251Z\", \"dateReserved\": \"2025-03-31T12:13:57.705Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2025-04-28T19:14:31.107Z\", \"assignerShortName\": \"apache\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2025-1365
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, um beliebige Befehle auszuf\u00fchren und um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1365 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1365.json" }, { "category": "self", "summary": "WID-SEC-2025-1365 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1365" }, { "category": "external", "summary": "IBM Security Bulletin 7237317 vom 2025-06-19", "url": "https://www.ibm.com/support/pages/node/7237317" }, { "category": "external", "summary": "IBM Security Bulletin 7237316 vom 2025-06-19", "url": "https://www.ibm.com/support/pages/node/7237316" }, { "category": "external", "summary": "IBM Security Bulletin 7239757 vom 2025-07-15", "url": "https://www.ibm.com/support/pages/node/7239757" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-15T22:00:00.000+00:00", "generator": { "date": "2025-07-16T07:32:15.040+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1365", "initial_release_date": "2025-06-19T22:00:00.000+00:00", "revision_history": [ { "date": "2025-06-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP12 IF02", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP12 IF02", "product_id": "T044767" } }, { "category": "product_version", "name": "7.5.0 UP12 IF02", "product": { "name": "IBM QRadar SIEM 7.5.0 UP12 IF02", "product_id": "T044767-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0:up12_if02" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-9840", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2016-9840" }, { "cve": "CVE-2020-11971", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2020-11971" }, { "cve": "CVE-2020-13790", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2020-13790" }, { "cve": "CVE-2022-49011", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2022-49011" }, { "cve": "CVE-2023-0286", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2024-12087", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-12087" }, { "cve": "CVE-2024-12088", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-12088" }, { "cve": "CVE-2024-12747", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-12747" }, { "cve": "CVE-2024-40906", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-40906" }, { "cve": "CVE-2024-43842", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-43842" }, { "cve": "CVE-2024-53141", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-53141" }, { "cve": "CVE-2024-53150", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-53150" }, { "cve": "CVE-2024-53241", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-53241" }, { "cve": "CVE-2024-8176", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-8176" }, { "cve": "CVE-2025-0395", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-0395" }, { "cve": "CVE-2025-22869", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-22869" }, { "cve": "CVE-2025-24528", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-24528" }, { "cve": "CVE-2025-31650", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-31650" }, { "cve": "CVE-2025-31651", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-31651" }, { "cve": "CVE-2025-46701", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-46701" }, { "cve": "CVE-2025-36050", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-36050" }, { "cve": "CVE-2025-33121", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-33121" }, { "cve": "CVE-2025-33117", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-33117" } ] }
wid-sec-w-2025-0895
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0895 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0895.json" }, { "category": "self", "summary": "WID-SEC-2025-0895 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0895" }, { "category": "external", "summary": "Lists Apache.org vom 2025-04-28", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" }, { "category": "external", "summary": "Lists Apache.org vom 2025-04-28", "url": "https://lists.apache.org/thread/cpklvqwvdrp4k9hmd2l3q33j0gzy4fox" }, { "category": "external", "summary": "OSS Security Mailing List vom 2025-04-28", "url": "https://seclists.org/oss-sec/2025/q2/100" }, { "category": "external", "summary": "OSS Security Mailing List vom 2025-04-28", "url": "https://seclists.org/oss-sec/2025/q2/101" }, { "category": "external", "summary": "GitHub Advisory Database vom 2025-04-28", "url": "https://github.com/advisories/GHSA-3p2h-wqq4-wf4h" }, { "category": "external", "summary": "GitHub Advisory Database vom 2025-04-28", "url": "https://github.com/advisories/GHSA-ff77-26x5-69cr" }, { "category": "external", "summary": "PoC CVE-2025-31650 vom 2025-04-29", "url": "https://github.com/tunahantekeoglu/CVE-2025-31650" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1521-1 vom 2025-05-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RFTKW33WAI4B3WZ5ZCAZYPZAMSCNNSM4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1537-1 vom 2025-05-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WLX5T7LK4QQHONBUWBDVFGFTQU32S6PX/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT9-2025-017 vom 2025-05-14", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT9-2025-017.html" }, { "category": "external", "summary": "Atlassian Security Advisory", "url": "https://jira.atlassian.com/browse/BAM-26105" }, { "category": "external", "summary": "Atlassian Security Advisory", "url": "https://jira.atlassian.com/browse/CONFSERVER-99686" }, { "category": "external", "summary": "IBM Security Bulletin 7234040 vom 2025-05-21", "url": "https://www.ibm.com/support/pages/node/7234040" }, { "category": "external", "summary": "Atlassian Security Advisory", "url": "https://jira.atlassian.com/browse/CONFSERVER-99568" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT9-2025-018 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT9-2025-018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01521-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020943.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01537-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020935.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01882-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021460.html" }, { "category": "external", "summary": "Atlassian Security Advisory JSWSERVER-26411 vom 2025-06-17", "url": "https://confluence.atlassian.com/security/security-bulletin-june-17-2025-1574012717.html" }, { "category": "external", "summary": "Trellix 2025 Update 5 Release Notes vom 2025-06-25", "url": "https://docs.trellix.com/bundle/epolicy-orchestrator-saas-release-notes/page/UUID-bdfa33f8-426e-ec2b-a46a-a50c7743b530.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2TOMCAT9-2025-018 vom 2025-06-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2TOMCAT9-2025-018.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2TOMCAT9-2025-017 vom 2025-06-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2TOMCAT9-2025-017.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11335 vom 2025-07-17", "url": "https://linux.oracle.com/errata/ELSA-2025-11335.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11335 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11332 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11333 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11334 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11333 vom 2025-07-17", "url": "https://linux.oracle.com/errata/ELSA-2025-11333.html" } ], "source_lang": "en-US", "title": "Apache Tomcat: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-16T22:00:00.000+00:00", "generator": { "date": "2025-07-17T06:07:06.751+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0895", "initial_release_date": "2025-04-28T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-28T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "2", "summary": "PoC f\u00fcr CVE-2025-31650 aufgenommen" }, { "date": "2025-05-08T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Atlassian und IBM aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Atlassian aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" } ], "status": "final", "version": "12" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.0.6", "product": { "name": "Apache Tomcat \u003c11.0.6", "product_id": "T043183" } }, { "category": "product_version", "name": "11.0.6", "product": { "name": "Apache Tomcat 11.0.6", "product_id": "T043183-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:11.0.6" } } }, { "category": "product_version_range", "name": "\u003c10.1.40", "product": { "name": "Apache Tomcat \u003c10.1.40", "product_id": "T043184" } }, { "category": "product_version", "name": "10.1.40", "product": { "name": "Apache Tomcat 10.1.40", "product_id": "T043184-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:10.1.40" } } }, { "category": "product_version_range", "name": "\u003c9.0.104", "product": { "name": "Apache Tomcat \u003c9.0.104", "product_id": "T043185" } }, { "category": "product_version", "name": "9.0.104", "product": { "name": "Apache Tomcat 9.0.104", "product_id": "T043185-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:9.0.104" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.2.4", "product": { "name": "Atlassian Bamboo \u003c10.2.4", "product_id": "T044013" } }, { "category": "product_version", "name": "10.2.4", "product": { "name": "Atlassian Bamboo 10.2.4", "product_id": "T044013-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:10.2.4" } } }, { "category": "product_version_range", "name": "\u003c9.6.13", "product": { "name": "Atlassian Bamboo \u003c9.6.13", "product_id": "T044014" } }, { "category": "product_version", "name": "9.6.13", "product": { "name": "Atlassian Bamboo 9.6.13", "product_id": "T044014-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:9.6.13" } } }, { "category": "product_version_range", "name": "\u003c11.0.1", "product": { "name": "Atlassian Bamboo \u003c11.0.1", "product_id": "T044015" } }, { "category": "product_version", "name": "11.0.1", "product": { "name": "Atlassian Bamboo 11.0.1", "product_id": "T044015-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:11.0.1" } } } ], "category": "product_name", "name": "Bamboo" }, { "branches": [ { "category": "product_version_range", "name": "\u003c9.2.2", "product": { "name": "Atlassian Confluence \u003c9.2.2", "product_id": "T042904" } }, { "category": "product_version", "name": "9.2.2", "product": { "name": "Atlassian Confluence 9.2.2", "product_id": "T042904-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:data_center_and_server__9.2.2" } } }, { "category": "product_version_range", "name": "\u003c9.3.2", "product": { "name": "Atlassian Confluence \u003c9.3.2", "product_id": "T042906" } }, { "category": "product_version", "name": "9.3.2", "product": { "name": "Atlassian Confluence 9.3.2", "product_id": "T042906-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:data_center_and_server__9.3.2" } } }, { "category": "product_version_range", "name": "\u003c8.5.21", "product": { "name": "Atlassian Confluence \u003c8.5.21", "product_id": "T042909" } }, { "category": "product_version", "name": "8.5.21", "product": { "name": "Atlassian Confluence 8.5.21", "product_id": "T042909-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:data_center_and_server__8.5.21" } } }, { "category": "product_version_range", "name": "\u003c9.4.1", "product": { "name": "Atlassian Confluence \u003c9.4.1", "product_id": "T044016" } }, { "category": "product_version", "name": "9.4.1", "product": { "name": "Atlassian Confluence 9.4.1", "product_id": "T044016-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:9.4.1" } } }, { "category": "product_version_range", "name": "\u003c9.2.4", "product": { "name": "Atlassian Confluence \u003c9.2.4", "product_id": "T044017" } }, { "category": "product_version", "name": "9.2.4", "product": { "name": "Atlassian Confluence 9.2.4", "product_id": "T044017-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:9.2.4" } } }, { "category": "product_version_range", "name": "\u003c8.5.22", "product": { "name": "Atlassian Confluence \u003c8.5.22", "product_id": "T044018" } }, { "category": "product_version", "name": "8.5.22", "product": { "name": "Atlassian Confluence 8.5.22", "product_id": "T044018-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:8.5.22" } } } ], "category": "product_name", "name": "Confluence" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.6.1", "product": { "name": "Atlassian Jira \u003c10.6.1", "product_id": "T044689" } }, { "category": "product_version", "name": "10.6.1", "product": { "name": "Atlassian Jira 10.6.1", "product_id": "T044689-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira:10.6.1" } } }, { "category": "product_version_range", "name": "\u003c10.3.6 (LTS)", "product": { "name": "Atlassian Jira \u003c10.3.6 (LTS)", "product_id": "T044691" } }, { "category": "product_version", "name": "10.3.6 (LTS)", "product": { "name": "Atlassian Jira 10.3.6 (LTS)", "product_id": "T044691-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira:10.3.6::lts" } } } ], "category": "product_name", "name": "Jira" } ], "category": "vendor", "name": "Atlassian" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "10.1.0.0-10.1.0.5", "product": { "name": "IBM Integration Bus 10.1.0.0-10.1.0.5", "product_id": "T044022", "product_identification_helper": { "cpe": "cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.5" } } } ], "category": "product_name", "name": "Integration Bus" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025 Update 5", "product": { "name": "Trellix ePolicy Orchestrator \u003c2025 Update 5", "product_id": "T044835" } }, { "category": "product_version", "name": "2025 Update 5", "product": { "name": "Trellix ePolicy Orchestrator 2025 Update 5", "product_id": "T044835-fixed", "product_identification_helper": { "cpe": "cpe:/a:trellix:epolicy_orchestrator:2025_update_5" } } } ], "category": "product_name", "name": "ePolicy Orchestrator" } ], "category": "vendor", "name": "Trellix" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-31650", "product_status": { "known_affected": [ "T042909", "67646", "T042904", "T004914", "T042906", "T044016", "T044015", "T044018", "T044689", "T044017", "T002207", "T044835", "T043183", "398363", "T043184", "T043185", "T044691", "T044022", "T044014", "T044013" ] }, "release_date": "2025-04-28T22:00:00.000+00:00", "title": "CVE-2025-31650" }, { "cve": "CVE-2025-31651", "product_status": { "known_affected": [ "T042909", "67646", "T042904", "T004914", "T042906", "T044016", "T044015", "T044018", "T044689", "T044017", "T002207", "T044835", "T043183", "398363", "T043184", "T043185", "T044691", "T044022", "T044014", "T044013" ] }, "release_date": "2025-04-28T22:00:00.000+00:00", "title": "CVE-2025-31651" } ] }
CERTFR-2025-AVI-0520
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Atlassian | Jira | Jira Service Management Server versions 10.6.x antérieures à 10.6.1 | ||
Atlassian | Jira | Jira Software Data Center versions 10.6.x antérieures à 10.6.1 | ||
Atlassian | Confluence | Confluence Data Center versions 9.5.x antérieures à 9.5.1 | ||
Atlassian | Jira | Jira Service Management Server versions antérieures à 10.3.6 | ||
Atlassian | Jira | Jira Service Management Data Center versions 10.6.x antérieures à 10.6.1 | ||
Atlassian | Jira | Jira Software Server versions antérieures à 10.6.1 | ||
Atlassian | Confluence | Confluence Data Center versions 9.2.x antérieures à 9.2.5 | ||
Atlassian | Jira | Jira Software Data Center versions antérieures à 10.3.6 | ||
Atlassian | Confluence | Confluence Server versions 9.5.x antérieures à 9.5.1 | ||
Atlassian | Confluence | Confluence Server versions 9.2.x antérieures à 9.2.5 | ||
Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.3.6 | ||
Atlassian | Confluence | Confluence Data Center versions 9.4.x antérieures à 9.4.1 | ||
Atlassian | Confluence | Confluence Server versions antérieures à 8.5.23 | ||
Atlassian | Confluence | Confluence Data Center versions antérieures à 8.5.23 | ||
Atlassian | Confluence | Confluence Server versions 9.4.x antérieures à 9.4.1 | ||
Atlassian | Jira | Jira Software Server versions antérieures à 10.3.6 |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Jira Service Management Server versions 10.6.x ant\u00e9rieures \u00e0 10.6.1", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Data Center versions 10.6.x ant\u00e9rieures \u00e0 10.6.1", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions 9.5.x ant\u00e9rieures \u00e0 9.5.1", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.6", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions 10.6.x ant\u00e9rieures \u00e0 10.6.1", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.6.1", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions 9.2.x ant\u00e9rieures \u00e0 9.2.5", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.3.6", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions 9.5.x ant\u00e9rieures \u00e0 9.5.1", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions 9.2.x ant\u00e9rieures \u00e0 9.2.5", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.6", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions 9.4.x ant\u00e9rieures \u00e0 9.4.1", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.23", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.23", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions 9.4.x ant\u00e9rieures \u00e0 9.4.1", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.3.6", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-22228", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2024-57699", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57699" } ], "initial_release_date": "2025-06-18T00:00:00", "last_revision_date": "2025-06-18T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0520", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian", "vendor_advisories": [ { "published_at": "2025-06-17", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99921", "url": "https://jira.atlassian.com/browse/CONFSERVER-99921" }, { "published_at": "2025-06-17", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99835", "url": "https://jira.atlassian.com/browse/CONFSERVER-99835" }, { "published_at": "2025-06-17", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16260", "url": "https://jira.atlassian.com/browse/JSDSERVER-16260" }, { "published_at": "2025-06-17", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26411", "url": "https://jira.atlassian.com/browse/JSWSERVER-26411" } ] }
CERTFR-2025-AVI-0352
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Apache Tomcat. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tomcat versions 10.1.x ant\u00e9rieures \u00e0 10.1.40", "product": { "name": "Tomcat", "vendor": { "name": "Apache", "scada": false } } }, { "description": "Tomcat versions 11.0.x ant\u00e9rieures \u00e0 11.0.6", "product": { "name": "Tomcat", "vendor": { "name": "Apache", "scada": false } } }, { "description": "Tomcat versions 9.0.x ant\u00e9rieures \u00e0 9.0.104", "product": { "name": "Tomcat", "vendor": { "name": "Apache", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" } ], "initial_release_date": "2025-04-29T00:00:00", "last_revision_date": "2025-04-29T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0352", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-29T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apache Tomcat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apache Tomcat", "vendor_advisories": [ { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Apache Tomcat Apache_Tomcat_9.0.104", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.104" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Apache Tomcat Apache_Tomcat_10.1.40", "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.40" }, { "published_at": "2025-04-09", "title": "Bulletin de s\u00e9curit\u00e9 Apache Tomcat Apache_Tomcat_11.0.6", "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.6" } ] }
CERTFR-2025-AVI-0585
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 8.1.2", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": " Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.2.1", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.30.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2023-1175", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1175" }, { "name": "CVE-2022-2817", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2817" }, { "name": "CVE-2022-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2182" }, { "name": "CVE-2024-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891" }, { "name": "CVE-2023-4504", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4504" }, { "name": "CVE-2022-2874", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2874" }, { "name": "CVE-2025-25724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25724" }, { "name": "CVE-2024-7531", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7531" }, { "name": "CVE-2021-25317", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25317" }, { "name": "CVE-2021-3968", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3968" }, { "name": "CVE-2023-48237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48237" }, { "name": "CVE-2022-2344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2344" }, { "name": "CVE-2023-48706", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48706" }, { "name": "CVE-2022-3016", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3016" }, { "name": "CVE-2023-7216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7216" }, { "name": "CVE-2024-52615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52615" }, { "name": "CVE-2021-31535", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535" }, { "name": "CVE-2022-2285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2285" }, { "name": "CVE-2022-2208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2208" }, { "name": "CVE-2022-2982", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2982" }, { "name": "CVE-2023-5441", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5441" }, { "name": "CVE-2022-2287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2287" }, { "name": "CVE-2022-3153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3153" }, { "name": "CVE-2022-2946", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2946" }, { "name": "CVE-2022-2862", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2862" }, { "name": "CVE-2022-2889", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2889" }, { "name": "CVE-2021-4173", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4173" }, { "name": "CVE-2020-12413", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12413" }, { "name": "CVE-2025-4330", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4330" }, { "name": "CVE-2023-48235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48235" }, { "name": "CVE-2023-0051", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0051" }, { "name": "CVE-2024-43374", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43374" }, { "name": "CVE-2025-4138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4138" }, { "name": "CVE-2024-41957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41957" }, { "name": "CVE-2023-4781", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4781" }, { "name": "CVE-2023-48231", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48231" }, { "name": "CVE-2023-2609", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2609" }, { "name": "CVE-2022-3324", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3324" }, { "name": "CVE-2024-38819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819" }, { "name": "CVE-2023-1170", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1170" }, { "name": "CVE-2022-2257", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2257" }, { "name": "CVE-2024-45306", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45306" }, { "name": "CVE-2023-4751", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4751" }, { "name": "CVE-2021-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4136" }, { "name": "CVE-2023-4738", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4738" }, { "name": "CVE-2021-3928", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3928" }, { "name": "CVE-2015-1197", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1197" }, { "name": "CVE-2023-48233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48233" }, { "name": "CVE-2022-2042", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2042" }, { "name": "CVE-2022-2183", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2183" }, { "name": "CVE-2024-29040", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29040" }, { "name": "CVE-2017-1000383", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000383" }, { "name": "CVE-2025-47268", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47268" }, { "name": "CVE-2022-2304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2304" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2022-2819", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2819" }, { "name": "CVE-2022-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3705" }, { "name": "CVE-2023-1264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1264" }, { "name": "CVE-2022-4293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4293" }, { "name": "CVE-2025-26603", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26603" }, { "name": "CVE-2024-38820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820" }, { "name": "CVE-2022-3234", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3234" }, { "name": "CVE-2022-2126", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2126" }, { "name": "CVE-2021-3973", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3973" }, { "name": "CVE-2021-4166", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4166" }, { "name": "CVE-2022-3256", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3256" }, { "name": "CVE-2025-4517", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517" }, { "name": "CVE-2022-2343", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2343" }, { "name": "CVE-2022-2849", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2849" }, { "name": "CVE-2025-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4565" }, { "name": "CVE-2022-3235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3235" }, { "name": "CVE-2022-2980", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2980" }, { "name": "CVE-2024-41965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41965" }, { "name": "CVE-2022-3134", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3134" }, { "name": "CVE-2023-0512", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0512" }, { "name": "CVE-2022-2175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2175" }, { "name": "CVE-2022-3297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3297" }, { "name": "CVE-2022-0213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0213" }, { "name": "CVE-2022-1616", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1616" }, { "name": "CVE-2023-48236", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48236" }, { "name": "CVE-2025-4435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4435" }, { "name": "CVE-2024-47814", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47814" }, { "name": "CVE-2022-2923", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2923" }, { "name": "CVE-2025-6020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020" }, { "name": "CVE-2022-2284", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2284" }, { "name": "CVE-2024-12718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718" }, { "name": "CVE-2024-53920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53920" }, { "name": "CVE-2022-2286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2286" }, { "name": "CVE-2023-45803", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803" }, { "name": "CVE-2022-3352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3352" }, { "name": "CVE-2023-0054", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0054" }, { "name": "CVE-2025-31344", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31344" }, { "name": "CVE-2025-24014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24014" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2022-3296", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3296" }, { "name": "CVE-2021-45261", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45261" }, { "name": "CVE-2022-42889", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42889" }, { "name": "CVE-2023-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0433" }, { "name": "CVE-2022-2345", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2345" }, { "name": "CVE-2021-3974", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3974" }, { "name": "CVE-2022-2845", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2845" }, { "name": "CVE-2022-2210", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2210" }, { "name": "CVE-2022-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1725" }, { "name": "CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "name": "CVE-2023-4735", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4735" }, { "name": "CVE-2023-4734", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4734" }, { "name": "CVE-2023-2610", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2610" }, { "name": "CVE-2025-29768", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29768" }, { "name": "CVE-2022-1620", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1620" }, { "name": "CVE-2023-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5535" }, { "name": "CVE-2022-1720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1720" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2024-38828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828" }, { "name": "CVE-2022-4292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4292" }, { "name": "CVE-2024-47081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081" }, { "name": "CVE-2025-22134", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22134" }, { "name": "CVE-2025-1215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1215" }, { "name": "CVE-2023-48232", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48232" }, { "name": "CVE-2022-2522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2522" }, { "name": "CVE-2022-2129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2129" }, { "name": "CVE-2023-48234", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48234" }, { "name": "CVE-2022-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0351" }, { "name": "CVE-2024-22667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22667" }, { "name": "CVE-2023-46246", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46246" }, { "name": "CVE-2025-27151", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27151" }, { "name": "CVE-2024-43802", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43802" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2025-5702", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5702" }, { "name": "CVE-2023-0288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0288" }, { "name": "CVE-2025-52968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52968" }, { "name": "CVE-2022-3037", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3037" }, { "name": "CVE-2022-1674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1674" }, { "name": "CVE-2022-3278", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3278" }, { "name": "CVE-2022-2206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2206" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2022-2124", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2124" }, { "name": "CVE-2023-7207", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7207" }, { "name": "CVE-2022-1619", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1619" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2022-4141", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4141" }, { "name": "CVE-2022-3099", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3099" }, { "name": "CVE-2021-4187", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4187" }, { "name": "CVE-2023-32681", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681" }, { "name": "CVE-2021-3927", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3927" }, { "name": "CVE-2024-38816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816" }, { "name": "CVE-2021-34141", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34141" }, { "name": "CVE-2023-0049", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0049" }, { "name": "CVE-2023-5344", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5344" }, { "name": "CVE-2021-33430", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33430" }, { "name": "CVE-2022-2125", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2125" }, { "name": "CVE-2022-2207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2207" }, { "name": "CVE-2017-6519", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6519" }, { "name": "CVE-2025-3576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576" }, { "name": "CVE-2023-1127", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1127" } ], "initial_release_date": "2025-07-11T00:00:00", "last_revision_date": "2025-07-11T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0585", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu", "vendor_advisories": [ { "published_at": "2025-07-11", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35935", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35935" }, { "published_at": "2025-07-10", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35934", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35934" }, { "published_at": "2025-07-10", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35931", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35931" } ] }
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11", "product": { "name": "Tanzu Application Service", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11", "product": { "name": "Tanzu Application Service", "vendor": { "name": "VMware", "scada": false } } }, { "description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2020-8908", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908" }, { "name": "CVE-2022-3602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602" }, { "name": "CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "name": "CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "name": "CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "name": "CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "name": "CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "name": "CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "name": "CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "name": "CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "name": "CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "name": "CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "name": "CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "name": "CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "name": "CVE-2022-3786", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786" }, { "name": "CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "name": "CVE-2022-32205", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32205" }, { "name": "CVE-2022-32206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206" }, { "name": "CVE-2022-3996", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996" }, { "name": "CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "name": "CVE-2022-1434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434" }, { "name": "CVE-2022-1292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292" }, { "name": "CVE-2022-1343", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343" }, { "name": "CVE-2022-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473" }, { "name": "CVE-2022-27774", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27774" }, { "name": "CVE-2022-27775", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27775" }, { "name": "CVE-2022-22576", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22576" }, { "name": "CVE-2022-27776", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27776" }, { "name": "CVE-2022-2068", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068" }, { "name": "CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "name": "CVE-2022-2097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097" }, { "name": "CVE-2022-25647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647" }, { "name": "CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "name": "CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "name": "CVE-2022-27782", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782" }, { "name": "CVE-2022-32208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208" }, { "name": "CVE-2022-27781", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781" }, { "name": "CVE-2022-32207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207" }, { "name": "CVE-2022-3358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2022-32221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221" }, { "name": "CVE-2022-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916" }, { "name": "CVE-2022-35252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252" }, { "name": "CVE-2022-42915", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42915" }, { "name": "CVE-2022-43551", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551" }, { "name": "CVE-2022-43552", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43552" }, { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2022-4203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2023-23915", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23915" }, { "name": "CVE-2023-23914", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23914" }, { "name": "CVE-2023-23916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23916" }, { "name": "CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "name": "CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "name": "CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "name": "CVE-2022-41716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41716" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "name": "CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "name": "CVE-2022-41722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41722" }, { "name": "CVE-2022-30580", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580" }, { "name": "CVE-2022-41720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41720" }, { "name": "CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "name": "CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "name": "CVE-2023-24532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532" }, { "name": "CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2022-30634", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30634" }, { "name": "CVE-2023-27533", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533" }, { "name": "CVE-2023-27534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534" }, { "name": "CVE-2022-27780", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27780" }, { "name": "CVE-2022-29804", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29804" }, { "name": "CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "name": "CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "name": "CVE-2023-1255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255" }, { "name": "CVE-2023-28322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322" }, { "name": "CVE-2023-28320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320" }, { "name": "CVE-2023-28321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321" }, { "name": "CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "name": "CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "name": "CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-28319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28319" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404" }, { "name": "CVE-2023-29402", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402" }, { "name": "CVE-2023-29403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403" }, { "name": "CVE-2023-29405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405" }, { "name": "CVE-2023-2976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976" }, { "name": "CVE-2023-29409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409" }, { "name": "CVE-2023-29406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406" }, { "name": "CVE-2023-40403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-33201", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33201" }, { "name": "CVE-2016-1000027", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-40217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217" }, { "name": "CVE-2022-0563", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0563" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2023-39323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323" }, { "name": "CVE-2023-36617", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36617" }, { "name": "CVE-2022-23471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23471" }, { "name": "CVE-2023-25153", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25153" }, { "name": "CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-46218", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218" }, { "name": "CVE-2023-39318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318" }, { "name": "CVE-2023-39319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2023-39325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325" }, { "name": "CVE-2023-25173", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25173" }, { "name": "CVE-2022-31030", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31030" }, { "name": "CVE-2023-27043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043" }, { "name": "CVE-2023-36632", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632" }, { "name": "CVE-2024-28085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085" }, { "name": "CVE-2024-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511" }, { "name": "CVE-2020-22916", "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916" }, { "name": "CVE-2023-3978", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978" }, { "name": "CVE-2023-2253", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2253" }, { "name": "CVE-2024-25710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710" }, { "name": "CVE-2024-26308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308" }, { "name": "CVE-2023-6597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597" }, { "name": "CVE-2024-21011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011" }, { "name": "CVE-2024-21094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094" }, { "name": "CVE-2024-21068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21068" }, { "name": "CVE-2024-21085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085" }, { "name": "CVE-2024-21012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21012" }, { "name": "CVE-2023-28841", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28841" }, { "name": "CVE-2023-28842", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28842" }, { "name": "CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "name": "CVE-2023-45283", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45283" }, { "name": "CVE-2023-28840", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28840" }, { "name": "CVE-2023-45285", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285" }, { "name": "CVE-2023-45284", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45284" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2023-6378", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378" }, { "name": "CVE-2023-45289", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289" }, { "name": "CVE-2023-45290", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290" }, { "name": "CVE-2024-24783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783" }, { "name": "CVE-2024-24784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784" }, { "name": "CVE-2024-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2024-35255", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35255" }, { "name": "CVE-2024-24557", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24557" }, { "name": "CVE-2024-24786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786" }, { "name": "CVE-2024-28180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180" }, { "name": "CVE-2024-29857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857" }, { "name": "CVE-2024-30171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171" }, { "name": "CVE-2024-30172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2024-2398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398" }, { "name": "CVE-2024-0397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397" }, { "name": "CVE-2024-4030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030" }, { "name": "CVE-2024-4032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032" }, { "name": "CVE-2024-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450" }, { "name": "CVE-2024-36945", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945" }, { "name": "CVE-2024-21131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131" }, { "name": "CVE-2024-21138", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21138" }, { "name": "CVE-2024-21140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140" }, { "name": "CVE-2024-21144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144" }, { "name": "CVE-2024-21145", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145" }, { "name": "CVE-2024-21147", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147" }, { "name": "CVE-2023-28756", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28756" }, { "name": "CVE-2024-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923" }, { "name": "CVE-2024-3219", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219" }, { "name": "CVE-2023-45287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287" }, { "name": "CVE-2024-24787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787" }, { "name": "CVE-2024-42230", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230" }, { "name": "CVE-2024-6232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2022-24769", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24769" }, { "name": "CVE-2024-41110", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41110" }, { "name": "CVE-2024-38816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816" }, { "name": "CVE-2024-7264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264" }, { "name": "CVE-2024-8096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096" }, { "name": "CVE-2024-46812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812" }, { "name": "CVE-2024-46821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821" }, { "name": "CVE-2024-24789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789" }, { "name": "CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "name": "CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "name": "CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "name": "CVE-2024-46753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753" }, { "name": "CVE-2024-46787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787" }, { "name": "CVE-2024-24790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790" }, { "name": "CVE-2024-21208", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21208" }, { "name": "CVE-2024-21210", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21210" }, { "name": "CVE-2024-21217", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21217" }, { "name": "CVE-2024-21235", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21235" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2024-38819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819" }, { "name": "CVE-2024-38820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820" }, { "name": "CVE-2024-34447", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447" }, { "name": "CVE-2024-7592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592" }, { "name": "CVE-2024-8088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088" }, { "name": "CVE-2024-9681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681" }, { "name": "CVE-2024-11168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168" }, { "name": "CVE-2024-38828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828" }, { "name": "CVE-2024-50047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047" }, { "name": "CVE-2024-11053", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053" }, { "name": "CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "name": "CVE-2024-53051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051" }, { "name": "CVE-2024-0406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0406" }, { "name": "CVE-2024-53144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144" }, { "name": "CVE-2024-8805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805" }, { "name": "CVE-2025-21502", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21502" }, { "name": "CVE-2024-27282", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27282" }, { "name": "CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "name": "CVE-2024-56664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" }, { "name": "CVE-2025-0725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725" }, { "name": "CVE-2024-50602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795" }, { "name": "CVE-2024-51744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744" }, { "name": "CVE-2024-24791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791" }, { "name": "CVE-2025-22228", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228" }, { "name": "CVE-2023-24531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24531" }, { "name": "CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "name": "CVE-2024-45337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337" }, { "name": "CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "name": "CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2025-27113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113" }, { "name": "CVE-2020-36843", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36843" }, { "name": "CVE-2025-21587", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21587" }, { "name": "CVE-2025-30691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30691" }, { "name": "CVE-2025-30698", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30698" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-21941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941" }, { "name": "CVE-2025-21956", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956" }, { "name": "CVE-2025-21957", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957" }, { "name": "CVE-2025-21959", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959" }, { "name": "CVE-2025-21962", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962" }, { "name": "CVE-2025-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963" }, { "name": "CVE-2025-21964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964" }, { "name": "CVE-2025-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968" }, { "name": "CVE-2025-21970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970" }, { "name": "CVE-2025-21975", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975" }, { "name": "CVE-2025-21981", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981" }, { "name": "CVE-2025-21991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991" }, { "name": "CVE-2025-21992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992" }, { "name": "CVE-2025-21994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994" }, { "name": "CVE-2025-21996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996" }, { "name": "CVE-2025-21999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999" }, { "name": "CVE-2025-22004", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004" }, { "name": "CVE-2025-22005", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005" }, { "name": "CVE-2025-22007", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007" }, { "name": "CVE-2025-22008", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008" }, { "name": "CVE-2025-22010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010" }, { "name": "CVE-2025-22014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014" }, { "name": "CVE-2020-15250", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15250" }, { "name": "CVE-2024-12798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798" }, { "name": "CVE-2024-12801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801" }, { "name": "CVE-2024-29018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29018" }, { "name": "CVE-2025-21613", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21613" }, { "name": "CVE-2025-21614", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21614" }, { "name": "CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-2312", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2023-53034", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034" }, { "name": "CVE-2025-22025", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025" }, { "name": "CVE-2025-22035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035" }, { "name": "CVE-2025-22044", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044" }, { "name": "CVE-2025-22045", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045" }, { "name": "CVE-2025-22050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050" }, { "name": "CVE-2025-22054", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054" }, { "name": "CVE-2025-22055", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055" }, { "name": "CVE-2025-22056", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056" }, { "name": "CVE-2025-22060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060" }, { "name": "CVE-2025-22063", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063" }, { "name": "CVE-2025-22066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066" }, { "name": "CVE-2025-22071", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071" }, { "name": "CVE-2025-22073", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073" }, { "name": "CVE-2025-22075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075" }, { "name": "CVE-2025-22079", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079" }, { "name": "CVE-2025-22081", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081" }, { "name": "CVE-2025-22086", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086" }, { "name": "CVE-2025-22089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089" }, { "name": "CVE-2025-22097", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097" }, { "name": "CVE-2025-23136", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136" }, { "name": "CVE-2025-23138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138" }, { "name": "CVE-2025-37785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785" }, { "name": "CVE-2025-38152", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152" }, { "name": "CVE-2025-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575" }, { "name": "CVE-2025-38637", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637" }, { "name": "CVE-2025-39728", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728" }, { "name": "CVE-2025-39735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735" }, { "name": "CVE-2025-4516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2024-9287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287" }, { "name": "CVE-2025-4575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4575" }, { "name": "CVE-2022-49728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728" }, { "name": "CVE-2024-58093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093" }, { "name": "CVE-2025-22018", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018" }, { "name": "CVE-2025-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020" }, { "name": "CVE-2025-37798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2025-22021", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021" }, { "name": "CVE-2025-37889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889" }, { "name": "CVE-2025-37937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937" }, { "name": "CVE-2025-37890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890" }, { "name": "CVE-2025-37932", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932" }, { "name": "CVE-2025-4517", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517" }, { "name": "CVE-2025-4330", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4330" }, { "name": "CVE-2025-4138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4138" }, { "name": "CVE-2024-12718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718" }, { "name": "CVE-2025-4435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4435" }, { "name": "CVE-2025-41234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234" }, { "name": "CVE-2025-49146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146" }, { "name": "CVE-2025-27219", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27219" }, { "name": "CVE-2025-27220", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27220" }, { "name": "CVE-2025-48976", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976" }, { "name": "CVE-2025-48988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988" }, { "name": "CVE-2025-49124", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124" }, { "name": "CVE-2025-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125" }, { "name": "CVE-2024-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-6020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020" }, { "name": "CVE-2022-49636", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636" }, { "name": "CVE-2025-37997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997" }, { "name": "CVE-2025-38000", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000" }, { "name": "CVE-2025-38001", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001" }, { "name": "CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "name": "CVE-2025-32462", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462" }, { "name": "CVE-2025-52434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52434" }, { "name": "CVE-2025-53506", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506" }, { "name": "CVE-2024-47081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081" }, { "name": "CVE-2025-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749" }, { "name": "CVE-2025-30754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754" }, { "name": "CVE-2025-30761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30761" }, { "name": "CVE-2025-50059", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059" }, { "name": "CVE-2025-50106", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106" }, { "name": "CVE-2025-48734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734" }, { "name": "CVE-2021-3995", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3995" }, { "name": "CVE-2021-3996", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3996" }, { "name": "CVE-2022-28948", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28948" }, { "name": "CVE-2022-29173", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29173" }, { "name": "CVE-2022-35929", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35929" }, { "name": "CVE-2022-36056", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36056" }, { "name": "CVE-2022-36109", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36109" }, { "name": "CVE-2023-28755", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28755" }, { "name": "CVE-2023-30551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30551" }, { "name": "CVE-2023-33199", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33199" }, { "name": "CVE-2023-33202", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33202" }, { "name": "CVE-2023-46737", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46737" }, { "name": "CVE-2024-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337" }, { "name": "CVE-2024-24579", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24579" }, { "name": "CVE-2024-29902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29902" }, { "name": "CVE-2024-29903", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29903" }, { "name": "CVE-2024-40635", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40635" }, { "name": "CVE-2024-41909", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41909" }, { "name": "CVE-2024-45339", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339" }, { "name": "CVE-2024-47611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611" }, { "name": "CVE-2024-52587", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52587" }, { "name": "CVE-2024-6104", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6104" }, { "name": "CVE-2025-0913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913" }, { "name": "CVE-2025-22874", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874" }, { "name": "CVE-2025-25186", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25186" }, { "name": "CVE-2025-27221", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27221" }, { "name": "CVE-2025-29786", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29786" }, { "name": "CVE-2025-32441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32441" }, { "name": "CVE-2025-32955", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32955" }, { "name": "CVE-2025-32988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988" }, { "name": "CVE-2025-32989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989" }, { "name": "CVE-2025-32990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990" }, { "name": "CVE-2025-3445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3445" }, { "name": "CVE-2025-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177" }, { "name": "CVE-2025-46727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46727" }, { "name": "CVE-2025-4673", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673" }, { "name": "CVE-2025-47290", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47290" }, { "name": "CVE-2025-48060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060" }, { "name": "CVE-2025-4877", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877" }, { "name": "CVE-2025-4878", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878" }, { "name": "CVE-2025-48924", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924" }, { "name": "CVE-2025-49014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49014" }, { "name": "CVE-2025-4949", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4949" }, { "name": "CVE-2025-50181", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181" }, { "name": "CVE-2025-5318", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318" }, { "name": "CVE-2025-5372", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372" }, { "name": "CVE-2025-5914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914" }, { "name": "CVE-2025-5915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915" }, { "name": "CVE-2025-5916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916" }, { "name": "CVE-2025-5917", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917" }, { "name": "CVE-2025-6069", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069" }, { "name": "CVE-2025-6395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395" } ], "initial_release_date": "2025-07-25T00:00:00", "last_revision_date": "2025-07-25T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0622", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-25T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35981", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35967", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35980", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35974", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35979", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35984", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35970", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35983", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35978", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35968", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35973", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35976", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35969", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35966", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35972", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35977", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35982", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35971", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35975", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975" } ] }
CERTFR-2025-AVI-0754
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.5.4 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.0", "product": { "name": "Tanzu Gemfire", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.5.4", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-8941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941" }, { "name": "CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "name": "CVE-2025-22228", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228" }, { "name": "CVE-2021-45078", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45078" }, { "name": "CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "name": "CVE-2024-35255", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35255" }, { "name": "CVE-2025-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125" }, { "name": "CVE-2024-6104", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6104" }, { "name": "CVE-2022-44840", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44840" }, { "name": "CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "name": "CVE-2025-6965", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965" }, { "name": "CVE-2025-4517", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517" }, { "name": "CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "name": "CVE-2025-52999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999" }, { "name": "CVE-2025-6020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020" }, { "name": "CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "name": "CVE-2025-7425", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425" }, { "name": "CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "name": "CVE-2024-12718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718" }, { "name": "CVE-2024-45337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337" }, { "name": "CVE-2025-55163", "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163" }, { "name": "CVE-2025-9288", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288" }, { "name": "CVE-2025-48989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989" }, { "name": "CVE-2024-41110", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41110" }, { "name": "CVE-2025-48988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988" }, { "name": "CVE-2025-54410", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54410" }, { "name": "CVE-2025-52434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52434" }, { "name": "CVE-2025-4673", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-48924", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2025-41242", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41242" }, { "name": "CVE-2025-48734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734" } ], "initial_release_date": "2025-09-04T00:00:00", "last_revision_date": "2025-09-04T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0754", "revisions": [ { "description": "Version initiale", "revision_date": "2025-09-04T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": "2025-09-03", "title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0094", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36085" }, { "published_at": "2025-09-03", "title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0095", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36086" } ] }
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2019-2126", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2126" }, { "name": "CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "name": "CVE-2019-12900", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900" }, { "name": "CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "name": "CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "name": "CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "name": "CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "name": "CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "name": "CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "name": "CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "name": "CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "name": "CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "name": "CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "name": "CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "name": "CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "name": "CVE-2021-45943", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45943" }, { "name": "CVE-2021-34141", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34141" }, { "name": "CVE-2022-1941", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1941" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2022-41862", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41862" }, { "name": "CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "name": "CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "name": "CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "name": "CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "name": "CVE-2022-30580", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580" }, { "name": "CVE-2022-40898", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40898" }, { "name": "CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "name": "CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "name": "CVE-2023-24532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532" }, { "name": "CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "name": "CVE-2023-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2455" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "name": "CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "name": "CVE-2023-1255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255" }, { "name": "CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "name": "CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "name": "CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404" }, { "name": "CVE-2023-29402", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402" }, { "name": "CVE-2023-29403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403" }, { "name": "CVE-2023-29405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405" }, { "name": "CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "name": "CVE-2023-29409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409" }, { "name": "CVE-2023-29406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406" }, { "name": "CVE-2023-32681", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-4752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4752" }, { "name": "CVE-2023-45853", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-5870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5870" }, { "name": "CVE-2022-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0543" }, { "name": "CVE-2023-4039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039" }, { "name": "CVE-2021-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848" }, { "name": "CVE-2023-4016", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016" }, { "name": "CVE-2023-29383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2023-39323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323" }, { "name": "CVE-2023-31484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484" }, { "name": "CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-39318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318" }, { "name": "CVE-2023-39319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2024-1580", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1580" }, { "name": "CVE-2016-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781" }, { "name": "CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "name": "CVE-2023-45285", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2023-45289", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289" }, { "name": "CVE-2023-45290", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290" }, { "name": "CVE-2024-24783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783" }, { "name": "CVE-2024-24784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784" }, { "name": "CVE-2024-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2024-23807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23807" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2023-5752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "name": "CVE-2024-26458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458" }, { "name": "CVE-2024-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2023-4641", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641" }, { "name": "CVE-2024-22365", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365" }, { "name": "CVE-2024-22667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22667" }, { "name": "CVE-2023-6228", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228" }, { "name": "CVE-2023-45287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287" }, { "name": "CVE-2024-24787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787" }, { "name": "CVE-2024-24788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24788" }, { "name": "CVE-2024-7348", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7348" }, { "name": "CVE-2023-7008", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2024-24789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789" }, { "name": "CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "name": "CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "name": "CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "name": "CVE-2024-24790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2022-48468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48468" }, { "name": "CVE-2023-48161", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161" }, { "name": "CVE-2024-11168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168" }, { "name": "CVE-2024-10976", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10976" }, { "name": "CVE-2024-10977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10977" }, { "name": "CVE-2024-10978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10978" }, { "name": "CVE-2024-10979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10979" }, { "name": "CVE-2024-10041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041" }, { "name": "CVE-2024-10963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963" }, { "name": "CVE-2025-21490", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490" }, { "name": "CVE-2025-21491", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491" }, { "name": "CVE-2025-21497", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497" }, { "name": "CVE-2025-21500", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500" }, { "name": "CVE-2025-21501", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501" }, { "name": "CVE-2025-21503", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503" }, { "name": "CVE-2025-21505", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505" }, { "name": "CVE-2025-21519", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519" }, { "name": "CVE-2025-21522", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522" }, { "name": "CVE-2025-21523", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523" }, { "name": "CVE-2025-21529", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529" }, { "name": "CVE-2025-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540" }, { "name": "CVE-2025-21546", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546" }, { "name": "CVE-2025-21555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555" }, { "name": "CVE-2025-21559", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559" }, { "name": "CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" }, { "name": "CVE-2024-12797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1094" }, { "name": "CVE-2022-49043", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043" }, { "name": "CVE-2024-51744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744" }, { "name": "CVE-2024-24791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791" }, { "name": "CVE-2023-24531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24531" }, { "name": "CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "name": "CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "name": "CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2022-42967", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42967" }, { "name": "CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2025-27363", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27363" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2024-55549", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549" }, { "name": "CVE-2024-9287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2024-12133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133" }, { "name": "CVE-2024-12243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243" }, { "name": "CVE-2024-2236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236" }, { "name": "CVE-2025-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395" }, { "name": "CVE-2025-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390" }, { "name": "CVE-2025-31115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115" }, { "name": "CVE-2012-0880", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0880" }, { "name": "CVE-2017-17507", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17507" }, { "name": "CVE-2017-8806", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8806" }, { "name": "CVE-2018-10126", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10126" }, { "name": "CVE-2018-11205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11205" }, { "name": "CVE-2018-13866", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13866" }, { "name": "CVE-2018-13867", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13867" }, { "name": "CVE-2018-13868", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13868" }, { "name": "CVE-2018-13869", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13869" }, { "name": "CVE-2018-13870", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13870" }, { "name": "CVE-2018-13871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13871" }, { "name": "CVE-2018-13872", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13872" }, { "name": "CVE-2018-13874", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13874" }, { "name": "CVE-2018-13875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13875" }, { "name": "CVE-2018-13876", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13876" }, { "name": "CVE-2018-14031", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14031" }, { "name": "CVE-2018-14033", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14033" }, { "name": "CVE-2018-14034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14034" }, { "name": "CVE-2018-14035", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14035" }, { "name": "CVE-2018-14460", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14460" }, { "name": "CVE-2018-15671", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15671" }, { "name": "CVE-2018-16438", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16438" }, { "name": "CVE-2018-17432", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17432" }, { "name": "CVE-2018-17433", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17433" }, { "name": "CVE-2018-17434", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17434" }, { "name": "CVE-2018-17435", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17435" }, { "name": "CVE-2018-17436", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17436" }, { "name": "CVE-2018-17437", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17437" }, { "name": "CVE-2018-17438", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17438" }, { "name": "CVE-2018-17439", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17439" }, { "name": "CVE-2019-20005", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20005" }, { "name": "CVE-2019-20006", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20006" }, { "name": "CVE-2019-20007", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20007" }, { "name": "CVE-2019-20198", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20198" }, { "name": "CVE-2019-20199", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20199" }, { "name": "CVE-2019-20200", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20200" }, { "name": "CVE-2019-20201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20201" }, { "name": "CVE-2019-20202", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20202" }, { "name": "CVE-2019-6988", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6988" }, { "name": "CVE-2019-8396", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8396" }, { "name": "CVE-2019-8397", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8397" }, { "name": "CVE-2019-8398", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8398" }, { "name": "CVE-2019-9151", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9151" }, { "name": "CVE-2019-9152", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9152" }, { "name": "CVE-2020-10809", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10809" }, { "name": "CVE-2020-10810", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10810" }, { "name": "CVE-2020-10811", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10811" }, { "name": "CVE-2020-10812", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10812" }, { "name": "CVE-2020-18232", "url": "https://www.cve.org/CVERecord?id=CVE-2020-18232" }, { "name": "CVE-2020-18494", "url": "https://www.cve.org/CVERecord?id=CVE-2020-18494" }, { "name": "CVE-2021-26220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26220" }, { "name": "CVE-2021-26221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26221" }, { "name": "CVE-2021-26222", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26222" }, { "name": "CVE-2021-30485", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30485" }, { "name": "CVE-2021-31229", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31229" }, { "name": "CVE-2021-31347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31347" }, { "name": "CVE-2021-31348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31348" }, { "name": "CVE-2021-31598", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31598" }, { "name": "CVE-2021-33430", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33430" }, { "name": "CVE-2021-37501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37501" }, { "name": "CVE-2021-45829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45829" }, { "name": "CVE-2021-45830", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45830" }, { "name": "CVE-2021-45832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45832" }, { "name": "CVE-2021-45833", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45833" }, { "name": "CVE-2021-46242", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46242" }, { "name": "CVE-2021-46243", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46243" }, { "name": "CVE-2021-46244", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46244" }, { "name": "CVE-2022-25942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25942" }, { "name": "CVE-2022-25972", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25972" }, { "name": "CVE-2022-26061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26061" }, { "name": "CVE-2022-30045", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30045" }, { "name": "CVE-2022-4055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4055" }, { "name": "CVE-2022-47655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47655" }, { "name": "CVE-2023-0996", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0996" }, { "name": "CVE-2023-29659", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29659" }, { "name": "CVE-2023-32570", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32570" }, { "name": "CVE-2023-39328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39328" }, { "name": "CVE-2023-39329", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39329" }, { "name": "CVE-2023-51792", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51792" }, { "name": "CVE-2023-6879", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6879" }, { "name": "CVE-2024-27304", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27304" }, { "name": "CVE-2024-29157", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29157" }, { "name": "CVE-2024-29158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29158" }, { "name": "CVE-2024-29159", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29159" }, { "name": "CVE-2024-29160", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29160" }, { "name": "CVE-2024-29161", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29161" }, { "name": "CVE-2024-29162", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29162" }, { "name": "CVE-2024-29163", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29163" }, { "name": "CVE-2024-29164", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29164" }, { "name": "CVE-2024-29165", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29165" }, { "name": "CVE-2024-29166", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29166" }, { "name": "CVE-2024-32605", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32605" }, { "name": "CVE-2024-32606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32606" }, { "name": "CVE-2024-32607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32607" }, { "name": "CVE-2024-32608", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32608" }, { "name": "CVE-2024-32609", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32609" }, { "name": "CVE-2024-32610", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32610" }, { "name": "CVE-2024-32611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32611" }, { "name": "CVE-2024-32612", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32612" }, { "name": "CVE-2024-32613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32613" }, { "name": "CVE-2024-32614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32614" }, { "name": "CVE-2024-32615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32615" }, { "name": "CVE-2024-32616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32616" }, { "name": "CVE-2024-32617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32617" }, { "name": "CVE-2024-32618", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32618" }, { "name": "CVE-2024-32619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32619" }, { "name": "CVE-2024-32620", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32620" }, { "name": "CVE-2024-32621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32621" }, { "name": "CVE-2024-32622", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32622" }, { "name": "CVE-2024-32623", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32623" }, { "name": "CVE-2024-32624", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32624" }, { "name": "CVE-2024-33873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33873" }, { "name": "CVE-2024-33874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33874" }, { "name": "CVE-2024-33875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33875" }, { "name": "CVE-2024-33876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33876" }, { "name": "CVE-2024-33877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33877" }, { "name": "CVE-2024-34402", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34402" }, { "name": "CVE-2024-34403", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34403" }, { "name": "CVE-2024-38949", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38949" }, { "name": "CVE-2024-38950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38950" }, { "name": "CVE-2024-41996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41996" }, { "name": "CVE-2024-45993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45993" }, { "name": "CVE-2024-46981", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46981" }, { "name": "CVE-2024-49203", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49203" }, { "name": "CVE-2024-5171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5171" }, { "name": "CVE-2024-51741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51741" }, { "name": "CVE-2024-52522", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52522" }, { "name": "CVE-2024-52616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52616" }, { "name": "CVE-2024-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427" }, { "name": "CVE-2024-53920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53920" }, { "name": "CVE-2024-56378", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56378" }, { "name": "CVE-2024-56406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406" }, { "name": "CVE-2024-56826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56826" }, { "name": "CVE-2024-56827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56827" }, { "name": "CVE-2024-6716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6716" }, { "name": "CVE-2025-2153", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2153" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-23022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23022" }, { "name": "CVE-2025-24528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528" }, { "name": "CVE-2025-4802", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802" } ], "initial_release_date": "2025-06-19T00:00:00", "last_revision_date": "2025-06-19T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0524", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-19T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu", "vendor_advisories": [ { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35841", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35844", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35843", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35842", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35846", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35849", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35840", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35847", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35839", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35845", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35848", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848" } ] }
CERTFR-2025-AVI-0435
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Atlassian | Confluence | Confluence Data Center versions antérieures à 9.3.2 | ||
Atlassian | Jira | Jira Core Data Center versions antérieures à 9.12.22 | ||
Atlassian | Confluence | Confluence Data Center versions antérieures à 8.5.22 | ||
Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.6.0 | ||
Atlassian | Jira | Jira Service Management Server versions antérieures à 10.6.0 | ||
Atlassian | Confluence | Confluence Server versions antérieures à 9.2.4 | ||
Atlassian | Jira | Jira Service Management Server versions antérieures à 5.12.22 | ||
Atlassian | Confluence | Confluence Server versions antérieures à 9.3.2 | ||
Atlassian | Jira | Jira Core Server versions antérieures à 10.5.1 | ||
Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.3.5 | ||
Atlassian | Jira | Jira Core Server versions antérieures à 10.3.5 | ||
Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.5.1 | ||
Atlassian | Confluence | Confluence Data Center versions antérieures à 9.2.4 | ||
Atlassian | Confluence | Confluence Server versions antérieures à 9.4.1 | ||
Atlassian | Jira | Jira Service Management Server versions antérieures à 9.12.22 | ||
Atlassian | Jira | Jira Service Management Server versions antérieures à 10.3.5 | ||
Atlassian | Jira | Jira Service Management Server versions antérieures à 10.5.1 | ||
Atlassian | Jira | Jira Core Data Center versions antérieures à 10.5.1 | ||
Atlassian | Jira | Jira Service Management Data Center versions antérieures à 5.12.22 | ||
Atlassian | Confluence | Confluence Server versions antérieures à 8.5.22 | ||
Atlassian | Confluence | Confluence Data Center versions antérieures à 9.4.1 | ||
Atlassian | Jira | Jira Core Server versions antérieures à 10.6.0 | ||
Atlassian | Jira | Jira Core Data Center versions antérieures à 10.6.0 | ||
Atlassian | Jira | Jira Core Data Center versions antérieures à 10.3.5 | ||
Atlassian | Jira | Jira Core Server versions antérieures à 9.12.22 | ||
Atlassian | Jira | Jira Service Management Data Center versions antérieures à 9.12.22 |
Title | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.3.2", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Core Data Center versions ant\u00e9rieures \u00e0 9.12.22", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.22", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.6.0", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.6.0", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.2.4", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.22", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.3.2", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Core Server versions ant\u00e9rieures \u00e0 10.5.1", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.5", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Core Server versions ant\u00e9rieures \u00e0 10.3.5", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.5.1", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.2.4", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.4.1", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 9.12.22", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.5", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.5.1", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Core Data Center versions ant\u00e9rieures \u00e0 10.5.1", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.22", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.22", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.4.1", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Core Server versions ant\u00e9rieures \u00e0 10.6.0", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Core Data Center versions ant\u00e9rieures \u00e0 10.6.0", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Core Data Center versions ant\u00e9rieures \u00e0 10.3.5", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Core Server versions ant\u00e9rieures \u00e0 9.12.22", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 9.12.22", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-24970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970" }, { "name": "CVE-2025-22157", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22157" }, { "name": "CVE-2024-47072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47072" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" } ], "initial_release_date": "2025-05-21T00:00:00", "last_revision_date": "2025-05-21T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0435", "revisions": [ { "description": "Version initiale", "revision_date": "2025-05-21T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian", "vendor_advisories": [ { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99686", "url": "https://jira.atlassian.com/browse/CONFSERVER-99686" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16206", "url": "https://jira.atlassian.com/browse/JSDSERVER-16206" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16207", "url": "https://jira.atlassian.com/browse/JSDSERVER-16207" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99568", "url": "https://jira.atlassian.com/browse/CONFSERVER-99568" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JRASERVER-78766", "url": "https://jira.atlassian.com/browse/JRASERVER-78766" } ] }
CERTFR-2025-AVI-0530
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
IBM | Sterling File Gateway | Sterling File Gateway versions 6.2.0.x antérieures à 6.2.0.5 | ||
IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP12 IF02 | ||
IBM | Sterling B2B Integrator | Sterling B2B Integrator versions 6.2.0.x antérieures à 6.2.0.5 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Sterling File Gateway versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.5", "product": { "name": "Sterling File Gateway", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP12 IF02", "product": { "name": "QRadar SIEM", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling B2B Integrator versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.5", "product": { "name": "Sterling B2B Integrator", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-24528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528" }, { "name": "CVE-2025-33117", "url": "https://www.cve.org/CVERecord?id=CVE-2025-33117" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "name": "CVE-2024-53150", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53150" }, { "name": "CVE-2016-9840", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9840" }, { "name": "CVE-2020-11971", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11971" }, { "name": "CVE-2025-33121", "url": "https://www.cve.org/CVERecord?id=CVE-2025-33121" }, { "name": "CVE-2020-13790", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13790" }, { "name": "CVE-2024-40906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40906" }, { "name": "CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "name": "CVE-2024-12087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12087" }, { "name": "CVE-2024-53141", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53141" }, { "name": "CVE-2024-53241", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53241" }, { "name": "CVE-2025-36050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-36050" }, { "name": "CVE-2024-43842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43842" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2024-12747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12747" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2022-49011", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49011" }, { "name": "CVE-2024-12088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12088" }, { "name": "CVE-2025-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" } ], "initial_release_date": "2025-06-20T00:00:00", "last_revision_date": "2025-06-20T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0530", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237159", "url": "https://www.ibm.com/support/pages/node/7237159" }, { "published_at": "2025-06-19", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237316", "url": "https://www.ibm.com/support/pages/node/7237316" }, { "published_at": "2025-06-19", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237317", "url": "https://www.ibm.com/support/pages/node/7237317" } ] }
rhsa-2025:11333
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11333", "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11333.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-10-10T00:30:02+00:00", "generator": { "date": "2025-10-10T00:30:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:11333", "initial_release_date": "2025-07-16T15:30:03+00:00", "revision_history": [ { "date": "2025-07-16T15:30:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-16T15:30:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:30:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_10.4.src", "product": { "name": "tomcat-1:9.0.87-1.el8_10.4.src", "product_id": "tomcat-1:9.0.87-1.el8_10.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_10.4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_10.4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src" }, "product_reference": "tomcat-1:9.0.87-1.el8_10.4.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:30:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:30:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11334
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11334", "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11334.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-10-10T00:30:02+00:00", "generator": { "date": "2025-10-10T00:30:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:11334", "initial_release_date": "2025-07-16T15:25:28+00:00", "revision_history": [ { "date": "2025-07-16T15:25:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-16T15:25:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:30:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_4.4.src", "product": { "name": "tomcat-1:9.0.87-1.el9_4.4.src", "product_id": "tomcat-1:9.0.87-1.el9_4.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_4.4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_4.4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src" }, "product_reference": "tomcat-1:9.0.87-1.el9_4.4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11335
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11335", "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11335.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-10-10T00:30:03+00:00", "generator": { "date": "2025-10-10T00:30:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:11335", "initial_release_date": "2025-07-16T15:28:33+00:00", "revision_history": [ { "date": "2025-07-16T15:28:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-16T15:28:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:30:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-3.el9_6.1.src", "product": { "name": "tomcat-1:9.0.87-3.el9_6.1.src", "product_id": "tomcat-1:9.0.87-3.el9_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-3.el9_6.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-3.el9_6.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src" }, "product_reference": "tomcat-1:9.0.87-3.el9_6.1.src", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:28:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:28:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11332
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat9 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11332", "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11332.json" } ], "title": "Red Hat Security Advisory: tomcat9 security update", "tracking": { "current_release_date": "2025-10-10T00:30:02+00:00", "generator": { "date": "2025-10-10T00:30:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:11332", "initial_release_date": "2025-07-16T15:19:33+00:00", "revision_history": [ { "date": "2025-07-16T15:19:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-16T15:19:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:30:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat9-1:9.0.87-5.el10_0.1.src", "product": { "name": "tomcat9-1:9.0.87-5.el10_0.1.src", "product_id": "tomcat9-1:9.0.87-5.el10_0.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9@9.0.87-5.el10_0.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat9-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-admin-webapps@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-docs-webapp@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-el-3.0-api@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-jsp-2.3-api@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-lib@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-servlet-4.0-api@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-webapps@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat9-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-1:9.0.87-5.el10_0.1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src" }, "product_reference": "tomcat9-1:9.0.87-5.el10_0.1.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:19:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:19:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:3608
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 6.1 is now available for Red Hat Enterprise Linux 8 and Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 6.1.0 serves as a replacement for Red Hat JBoss Web Server 6.0.5. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* org.apache.tomcat/tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API [jws-6] (CVE-2024-52316)\n* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT [jws-6] (CVE-2025-24813)\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [jws-6] (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3608", "url": "https://access.redhat.com/errata/RHSA-2025:3608" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.1/html/red_hat_jboss_web_server_6.1_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.1/html/red_hat_jboss_web_server_6.1_release_notes/index" }, { "category": "external", "summary": "2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3608.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.0 release and security update", "tracking": { "current_release_date": "2025-10-10T00:28:37+00:00", "generator": { "date": "2025-10-10T00:28:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:3608", "initial_release_date": "2025-04-07T17:03:27+00:00", "revision_history": [ { "date": "2025-04-07T17:03:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-19T10:13:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:28:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 6.1 for RHEL 8", "product": { "name": "Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.1::el8" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 6.1 for RHEL 9", "product": { "name": "Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.1::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "product": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "product_id": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jakartaee-migration@1.0.6-2.redhat_00003.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "product": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "product_id": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native@1.3.1-1.redhat_1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "product": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "product_id": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.36-6.redhat_00007.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "product": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "product_id": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jakartaee-migration@1.0.6-2.redhat_00003.1.el9jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "product": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "product_id": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native@1.3.1-1.redhat_1.el9jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "product": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "product_id": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.36-6.redhat_00007.1.el9jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "product": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "product_id": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jakartaee-migration@1.0.6-2.redhat_00003.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "product": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "product_id": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jakartaee-migration@1.0.6-2.redhat_00003.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "product": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "product_id": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native@1.3.1-1.redhat_1.el8jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "product": { "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "product_id": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native-debuginfo@1.3.1-1.redhat_1.el8jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "product": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "product_id": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native@1.3.1-1.redhat_1.el9jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "product": { "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "product_id": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native-debuginfo@1.3.1-1.redhat_1.el9jws?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src" }, "product_reference": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src" }, "product_reference": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src" }, "product_reference": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64 as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64" }, "product_reference": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64 as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64" }, "product_reference": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src" }, "product_reference": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src" }, "product_reference": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src" }, "product_reference": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64 as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64" }, "product_reference": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64 as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" }, "product_reference": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2024-11-18T12:00:54.223330+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2326972" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat when configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component. This vulnerability allows authentication bypass via improperly handled exceptions during the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has assessed this flaw at Attack Complexity as High, and impact metrics Confidentiality and Integrity as High, with a resultant base flaw Security Impact of Important. However, the factors involved in successful exploitation--usage of a custom Jakarta ServerAuthContext component, possible mishandling of exception management in that custom component, and failure in such a way as to allow a failed authentication to proceed in that exception mishandling--are sufficiently unlikely, such that Apache determined the impact to be Low. While Red Hat concurs with the worst-case assessment of Important for the base flaw, all products are assessed as Low, per individual risk assessment and in concurrence with Apache\u0027s rating.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "known_not_affected": [ "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "RHBZ#2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-52316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52316" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316" }, { "category": "external", "summary": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928", "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" } ], "release_date": "2024-11-18T11:32:22.072000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:03:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3608" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API" }, { "cve": "CVE-2025-24813", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2025-03-10T17:00:47.696071+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351129" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. In certain conditions and configurations, this vulnerability allows a remote attacker to exploit a path equivalence flaw to view file system contents and add malicious content via a write-enabled\u00a0Default Servlet\u00a0in Apache Tomcat. \n\nFor the vulnerability to be exploited, the following conditions must be true: writes to the default servlet are enabled (disabled by default), sensitive file uploads are sub-directories of a target URL for public uploads, attackers know the names of the files, and those files are subject to partial PUT uploads enabled by default. If an application uses file-based session persistence with default storage and includes exploitable libraries, remote code execution (RCE) is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability has a Moderate impact (rather than Important) because it requires multiple non-default configurations to be exploitable, significantly limiting its impact in typical deployments. For remote code execution (RCE), exploitation requires both file-based session persistence and a library vulnerable to deserialization, further reducing its likelihood. For information disclosure or file injection, the attack is only possible if writes are enabled for the default servlet, partial PUT requests are supported, and sensitive file uploads occur within a publicly writable directory. The combination of all three of these conditions is uncommon in secure environments. Since most modern Tomcat deployments do not meet all these criteria simultaneously, the overall risk is reduced\n\nThe Tomcat package as shipped in Red Hat Enterprise Linux 6 and 7 is not affected by this vulnerability because the vulnerable code was introduced in a newer Tomcat version.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform. Satellite configuration does not contain affected parameters that would make Tomcat vulnerable, therefore, even if a vulnerable Tomcat version is shipped with affected RHEL release alongside Satellite, there is no chance of it being exposed to flaw in Red Hat Satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "known_not_affected": [ "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "RHBZ#2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24813", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813" }, { "category": "external", "summary": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "url": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-10T16:44:03.715000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:03:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3608" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-04-01T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:03:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3608" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11381
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11381", "url": "https://access.redhat.com/errata/RHSA-2025:11381" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11381.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-10-10T00:30:03+00:00", "generator": { "date": "2025-10-10T00:30:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:11381", "initial_release_date": "2025-07-17T10:53:55+00:00", "revision_history": [ { "date": "2025-07-17T10:53:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-17T10:53:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:30:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_2.4.src", "product": { "name": "tomcat-1:9.0.87-1.el9_2.4.src", "product_id": "tomcat-1:9.0.87-1.el9_2.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_2.4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_2.4.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src" }, "product_reference": "tomcat-1:9.0.87-1.el9_2.4.src", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-17T10:53:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11381" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-17T10:53:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11381" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:4522
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 5.8.4 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.8.4 serves as a replacement for Red Hat JBoss Web Server 5.8.3. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation [jws-5] (CVE-2024-56337)\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [jws-5] (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:4522", "url": "https://access.redhat.com/errata/RHSA-2025:4522" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html/red_hat_jboss_web_server_5.8_service_pack_4_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html/red_hat_jboss_web_server_5.8_service_pack_4_release_notes/index" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4522.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.4 release and security update", "tracking": { "current_release_date": "2025-10-10T00:30:05+00:00", "generator": { "date": "2025-10-10T00:30:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:4522", "initial_release_date": "2025-05-08T12:15:06+00:00", "revision_history": [ { "date": "2025-05-08T12:15:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-19T10:13:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:30:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5", "product": { "name": "Red Hat JBoss Web Server 5", "product_id": "Red Hat JBoss Web Server 5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-08T12:15:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4522" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Web Server 5" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-08T12:15:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4522" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "Red Hat JBoss Web Server 5" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:3609
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 6.1.0 zip release is now available for Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 6.1.0 serves as a replacement for Red Hat JBoss Web Server 6.0.5. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* org.apache.tomcat/tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API [jws-6] (CVE-2024-52316)\n* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT [jws-6] (CVE-2025-24813)\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [jws-6] (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3609", "url": "https://access.redhat.com/errata/RHSA-2025:3609" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.1/html/red_hat_jboss_web_server_6.1_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.1/html/red_hat_jboss_web_server_6.1_release_notes/index" }, { "category": "external", "summary": "2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3609.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.0 release and security update", "tracking": { "current_release_date": "2025-10-10T00:28:38+00:00", "generator": { "date": "2025-10-10T00:28:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:3609", "initial_release_date": "2025-04-07T17:01:23+00:00", "revision_history": [ { "date": "2025-04-07T17:01:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-19T10:12:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:28:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 6", "product": { "name": "Red Hat JBoss Web Server 6", "product_id": "Red Hat JBoss Web Server 6", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2024-11-18T12:00:54.223330+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2326972" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat when configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component. This vulnerability allows authentication bypass via improperly handled exceptions during the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has assessed this flaw at Attack Complexity as High, and impact metrics Confidentiality and Integrity as High, with a resultant base flaw Security Impact of Important. However, the factors involved in successful exploitation--usage of a custom Jakarta ServerAuthContext component, possible mishandling of exception management in that custom component, and failure in such a way as to allow a failed authentication to proceed in that exception mishandling--are sufficiently unlikely, such that Apache determined the impact to be Low. While Red Hat concurs with the worst-case assessment of Important for the base flaw, all products are assessed as Low, per individual risk assessment and in concurrence with Apache\u0027s rating.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 6" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "RHBZ#2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-52316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52316" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316" }, { "category": "external", "summary": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928", "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" } ], "release_date": "2024-11-18T11:32:22.072000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:01:23+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 6" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3609" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 6" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API" }, { "cve": "CVE-2025-24813", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2025-03-10T17:00:47.696071+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351129" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. In certain conditions and configurations, this vulnerability allows a remote attacker to exploit a path equivalence flaw to view file system contents and add malicious content via a write-enabled\u00a0Default Servlet\u00a0in Apache Tomcat. \n\nFor the vulnerability to be exploited, the following conditions must be true: writes to the default servlet are enabled (disabled by default), sensitive file uploads are sub-directories of a target URL for public uploads, attackers know the names of the files, and those files are subject to partial PUT uploads enabled by default. If an application uses file-based session persistence with default storage and includes exploitable libraries, remote code execution (RCE) is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability has a Moderate impact (rather than Important) because it requires multiple non-default configurations to be exploitable, significantly limiting its impact in typical deployments. For remote code execution (RCE), exploitation requires both file-based session persistence and a library vulnerable to deserialization, further reducing its likelihood. For information disclosure or file injection, the attack is only possible if writes are enabled for the default servlet, partial PUT requests are supported, and sensitive file uploads occur within a publicly writable directory. The combination of all three of these conditions is uncommon in secure environments. Since most modern Tomcat deployments do not meet all these criteria simultaneously, the overall risk is reduced\n\nThe Tomcat package as shipped in Red Hat Enterprise Linux 6 and 7 is not affected by this vulnerability because the vulnerable code was introduced in a newer Tomcat version.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform. Satellite configuration does not contain affected parameters that would make Tomcat vulnerable, therefore, even if a vulnerable Tomcat version is shipped with affected RHEL release alongside Satellite, there is no chance of it being exposed to flaw in Red Hat Satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 6" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "RHBZ#2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24813", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813" }, { "category": "external", "summary": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "url": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-10T16:44:03.715000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:01:23+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 6" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Web Server 6" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 6" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-04-01T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 6" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:01:23+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 6" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3609" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "Red Hat JBoss Web Server 6" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 6" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:4521
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 5.8 on Red Hat Enterprise Linux versions 7, 8, and 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.8.4 serves as a replacement for Red Hat JBoss Web Server 5.8.3. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation [jws-5] (CVE-2024-56337)\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [jws-5] (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:4521", "url": "https://access.redhat.com/errata/RHSA-2025:4521" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html/red_hat_jboss_web_server_5.8_service_pack_4_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html/red_hat_jboss_web_server_5.8_service_pack_4_release_notes/index" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4521.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.4 release and security update", "tracking": { "current_release_date": "2025-10-10T00:30:05+00:00", "generator": { "date": "2025-10-10T00:30:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:4521", "initial_release_date": "2025-05-08T12:17:27+00:00", "revision_history": [ { "date": "2025-05-08T12:17:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-19T10:13:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:30:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 8", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 9", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el7jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el9jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk11@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk8@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-08T12:17:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4521" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-08T12:17:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4521" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11382
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11382", "url": "https://access.redhat.com/errata/RHSA-2025:11382" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11382.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-10-10T00:30:03+00:00", "generator": { "date": "2025-10-10T00:30:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:11382", "initial_release_date": "2025-07-17T11:05:31+00:00", "revision_history": [ { "date": "2025-07-17T11:05:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-17T11:05:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:30:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_8.5.src", "product": { "name": "tomcat-1:9.0.87-1.el8_8.5.src", "product_id": "tomcat-1:9.0.87-1.el8_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_8.5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.5.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.5.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-17T11:05:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11382" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-17T11:05:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11382" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
fkie_cve-2025-31650
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
URL | Tags | ||
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826 | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/04/28/2 | Mailing List, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
apache | tomcat | * | |
apache | tomcat | * | |
apache | tomcat | * | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F4F87EB-0046-4BAA-91C8-C60C60425186", "versionEndExcluding": "9.0.104", "versionStartIncluding": "9.0.76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EC8AA6F-0BB4-4075-8F2B-DE39FD9A2BD8", "versionEndExcluding": "10.1.40", "versionStartIncluding": "10.1.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "45AB4386-DB38-4808-924A-617CECE9F939", "versionEndExcluding": "11.0.6", "versionStartIncluding": "11.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*", "matchCriteriaId": "57088BDD-A136-45EF-A8A1-2EBF79CEC2CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*", "matchCriteriaId": "B32D1D7A-A04F-444E-8F45-BB9A9E4B0199", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:*", "matchCriteriaId": "0092FB35-3B00-484F-A24D-7828396A4FF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:*", "matchCriteriaId": "CB557E88-FA9D-4B69-AA6F-EAEE7F9B01AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:*", "matchCriteriaId": "72D3C6F1-84FA-4F82-96C1-9A8DA1C1F30F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:*", "matchCriteriaId": "3521C81B-37D9-48FC-9540-D0D333B9A4A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:*", "matchCriteriaId": "02A84634-A8F2-4BA9-B9F3-BEF36AEC5480", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone17:*:*:*:*:*:*", "matchCriteriaId": "ECBBC1F1-C86B-40AF-B740-A99F6B27682A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone18:*:*:*:*:*:*", "matchCriteriaId": "9D2206B2-F3FF-43F2-B3E2-3CAAC64C691D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone19:*:*:*:*:*:*", "matchCriteriaId": "0495A538-4102-40D0-A35C-0179CFD52A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*", "matchCriteriaId": "2AAD52CE-94F5-4F98-A027-9A7E68818CB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone20:*:*:*:*:*:*", "matchCriteriaId": "77BA6600-0890-4BA1-B447-EC1746BAB4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone21:*:*:*:*:*:*", "matchCriteriaId": "7914D26B-CBD6-4846-9BD3-403708D69319", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone22:*:*:*:*:*:*", "matchCriteriaId": "123C6285-03BE-49FC-B821-8BDB25D02863", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:*", "matchCriteriaId": "8A28C2E2-B7BC-46CE-94E4-AE3EF172AA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:*", "matchCriteriaId": "069B0D8E-8223-4C4E-A834-C6235D6C3450", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:*", "matchCriteriaId": "E6282085-5716-4874-B0B0-180ECDEE128F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*", "matchCriteriaId": "F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*", "matchCriteriaId": "03A171AF-2EC8-4422-912C-547CDB58CAAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*", "matchCriteriaId": "538E68C4-0BA4-495F-AEF8-4EF6EE7963CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*", "matchCriteriaId": "49350A6E-5E1D-45B2-A874-3B8601B3ADCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*", "matchCriteriaId": "5F50942F-DF54-46C0-8371-9A476DD3EEA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*", "matchCriteriaId": "D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*", "matchCriteriaId": "98792138-DD56-42DF-9612-3BDC65EEC117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\n\nThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.90 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue." }, { "lang": "es", "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Tomcat. La gesti\u00f3n incorrecta de errores en algunos encabezados de prioridad HTTP no v\u00e1lidos provoc\u00f3 una limpieza incompleta de la solicitud fallida, lo que gener\u00f3 una fuga de memoria. Un gran n\u00famero de solicitudes de este tipo podr\u00eda generar una excepci\u00f3n OutOfMemoryException, lo que resulta en una denegaci\u00f3n de servicio. Este problema afecta a Apache Tomcat: de la 9.0.76 a la 9.0.102, de la 10.1.10 a la 10.1.39 y de la 11.0.0-M2 a la 11.0.5. Se recomienda actualizar a las versiones 9.0.104, 10.1.40 o 11.0.6, que solucionan el problema." } ], "id": "CVE-2025-31650", "lastModified": "2025-08-08T12:15:27.817", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-04-28T20:15:20.653", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2025/04/28/2" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "security@apache.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
opensuse-su-2025:15049-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat10-10.1.40-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat10-10.1.40-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15049", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15049-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-31650 page", "url": "https://www.suse.com/security/cve/CVE-2025-31650/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-31651 page", "url": "https://www.suse.com/security/cve/CVE-2025-31651/" } ], "title": "tomcat10-10.1.40-1.1 on GA media", "tracking": { "current_release_date": "2025-05-02T00:00:00Z", "generator": { "date": "2025-05-02T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15049-1", "initial_release_date": "2025-05-02T00:00:00Z", "revision_history": [ { "date": "2025-05-02T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-10.1.40-1.1.aarch64", "product_id": "tomcat10-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-admin-webapps-10.1.40-1.1.aarch64", "product_id": "tomcat10-admin-webapps-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-doc-10.1.40-1.1.aarch64", "product_id": "tomcat10-doc-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-docs-webapp-10.1.40-1.1.aarch64", "product_id": "tomcat10-docs-webapp-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "product_id": "tomcat10-el-5_0-api-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-embed-10.1.40-1.1.aarch64", "product_id": "tomcat10-embed-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "product_id": "tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-jsvc-10.1.40-1.1.aarch64", "product_id": "tomcat10-jsvc-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-lib-10.1.40-1.1.aarch64", "product_id": "tomcat10-lib-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "product_id": "tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.40-1.1.aarch64", "product": { "name": "tomcat10-webapps-10.1.40-1.1.aarch64", "product_id": "tomcat10-webapps-10.1.40-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-10.1.40-1.1.ppc64le", "product_id": "tomcat10-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "product_id": "tomcat10-admin-webapps-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-doc-10.1.40-1.1.ppc64le", "product_id": "tomcat10-doc-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "product_id": "tomcat10-docs-webapp-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "product_id": "tomcat10-el-5_0-api-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-embed-10.1.40-1.1.ppc64le", "product_id": "tomcat10-embed-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "product_id": "tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-jsvc-10.1.40-1.1.ppc64le", "product_id": "tomcat10-jsvc-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-lib-10.1.40-1.1.ppc64le", "product_id": "tomcat10-lib-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "product_id": "tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.40-1.1.ppc64le", "product": { "name": "tomcat10-webapps-10.1.40-1.1.ppc64le", "product_id": "tomcat10-webapps-10.1.40-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.40-1.1.s390x", "product": { "name": "tomcat10-10.1.40-1.1.s390x", "product_id": "tomcat10-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.40-1.1.s390x", "product": { "name": "tomcat10-admin-webapps-10.1.40-1.1.s390x", "product_id": "tomcat10-admin-webapps-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.40-1.1.s390x", "product": { "name": "tomcat10-doc-10.1.40-1.1.s390x", "product_id": "tomcat10-doc-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.40-1.1.s390x", "product": { "name": "tomcat10-docs-webapp-10.1.40-1.1.s390x", "product_id": "tomcat10-docs-webapp-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.40-1.1.s390x", "product": { "name": "tomcat10-el-5_0-api-10.1.40-1.1.s390x", "product_id": "tomcat10-el-5_0-api-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.40-1.1.s390x", "product": { "name": "tomcat10-embed-10.1.40-1.1.s390x", "product_id": "tomcat10-embed-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "product": { "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "product_id": "tomcat10-jsp-3_1-api-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.40-1.1.s390x", "product": { "name": "tomcat10-jsvc-10.1.40-1.1.s390x", "product_id": "tomcat10-jsvc-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.40-1.1.s390x", "product": { "name": "tomcat10-lib-10.1.40-1.1.s390x", "product_id": "tomcat10-lib-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "product": { "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "product_id": "tomcat10-servlet-6_0-api-10.1.40-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.40-1.1.s390x", "product": { "name": "tomcat10-webapps-10.1.40-1.1.s390x", "product_id": "tomcat10-webapps-10.1.40-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-10.1.40-1.1.x86_64", "product_id": "tomcat10-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-admin-webapps-10.1.40-1.1.x86_64", "product_id": "tomcat10-admin-webapps-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-doc-10.1.40-1.1.x86_64", "product_id": "tomcat10-doc-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-docs-webapp-10.1.40-1.1.x86_64", "product_id": "tomcat10-docs-webapp-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "product_id": "tomcat10-el-5_0-api-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-embed-10.1.40-1.1.x86_64", "product_id": "tomcat10-embed-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "product_id": "tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-jsvc-10.1.40-1.1.x86_64", "product_id": "tomcat10-jsvc-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-lib-10.1.40-1.1.x86_64", "product_id": "tomcat10-lib-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "product_id": "tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.40-1.1.x86_64", "product": { "name": "tomcat10-webapps-10.1.40-1.1.x86_64", "product_id": "tomcat10-webapps-10.1.40-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-admin-webapps-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-admin-webapps-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-admin-webapps-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-doc-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-doc-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-doc-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-doc-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-docs-webapp-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-docs-webapp-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-docs-webapp-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-el-5_0-api-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-embed-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-embed-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-embed-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-embed-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-jsvc-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-jsvc-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-jsvc-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-jsvc-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-lib-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-lib-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-lib-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-lib-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.40-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.aarch64" }, "product_reference": "tomcat10-webapps-10.1.40-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.40-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.ppc64le" }, "product_reference": "tomcat10-webapps-10.1.40-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.40-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.s390x" }, "product_reference": "tomcat10-webapps-10.1.40-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.40-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.x86_64" }, "product_reference": "tomcat10-webapps-10.1.40-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-31650", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-31650" } ], "notes": [ { "category": "general", "text": "Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\n\nThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.90 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-31650", "url": "https://www.suse.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "SUSE Bug 1242008 for CVE-2025-31650", "url": "https://bugzilla.suse.com/1242008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-02T00:00:00Z", "details": "important" } ], "title": "CVE-2025-31650" }, { "cve": "CVE-2025-31651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-31651" } ], "notes": [ { "category": "general", "text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible \nfor a specially crafted request to bypass some rewrite rules. If those \nrewrite rules effectively enforced security constraints, those \nconstraints could be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-31651", "url": "https://www.suse.com/security/cve/CVE-2025-31651" }, { "category": "external", "summary": "SUSE Bug 1242009 for CVE-2025-31651", "url": "https://bugzilla.suse.com/1242009" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.40-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.40-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-02T00:00:00Z", "details": "important" } ], "title": "CVE-2025-31651" } ] }
opensuse-su-2025:15048-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat-9.0.104-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat-9.0.104-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15048", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15048-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-31650 page", "url": "https://www.suse.com/security/cve/CVE-2025-31650/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-31651 page", "url": "https://www.suse.com/security/cve/CVE-2025-31651/" } ], "title": "tomcat-9.0.104-1.1 on GA media", "tracking": { "current_release_date": "2025-05-02T00:00:00Z", "generator": { "date": "2025-05-02T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15048-1", "initial_release_date": "2025-05-02T00:00:00Z", "revision_history": [ { "date": "2025-05-02T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.104-1.1.aarch64", "product": { "name": "tomcat-9.0.104-1.1.aarch64", "product_id": "tomcat-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.104-1.1.aarch64", "product": { "name": "tomcat-admin-webapps-9.0.104-1.1.aarch64", "product_id": "tomcat-admin-webapps-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.104-1.1.aarch64", "product": { "name": "tomcat-docs-webapp-9.0.104-1.1.aarch64", "product_id": "tomcat-docs-webapp-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.104-1.1.aarch64", "product": { "name": "tomcat-el-3_0-api-9.0.104-1.1.aarch64", "product_id": "tomcat-el-3_0-api-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-embed-9.0.104-1.1.aarch64", "product": { "name": "tomcat-embed-9.0.104-1.1.aarch64", "product_id": "tomcat-embed-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.104-1.1.aarch64", "product": { "name": "tomcat-javadoc-9.0.104-1.1.aarch64", "product_id": "tomcat-javadoc-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "product": { "name": "tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "product_id": "tomcat-jsp-2_3-api-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.104-1.1.aarch64", "product": { "name": "tomcat-jsvc-9.0.104-1.1.aarch64", "product_id": "tomcat-jsvc-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-lib-9.0.104-1.1.aarch64", "product": { "name": "tomcat-lib-9.0.104-1.1.aarch64", "product_id": "tomcat-lib-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "product": { "name": "tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "product_id": "tomcat-servlet-4_0-api-9.0.104-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.104-1.1.aarch64", "product": { "name": "tomcat-webapps-9.0.104-1.1.aarch64", "product_id": "tomcat-webapps-9.0.104-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-9.0.104-1.1.ppc64le", "product_id": "tomcat-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-admin-webapps-9.0.104-1.1.ppc64le", "product_id": "tomcat-admin-webapps-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-docs-webapp-9.0.104-1.1.ppc64le", "product_id": "tomcat-docs-webapp-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "product_id": "tomcat-el-3_0-api-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-embed-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-embed-9.0.104-1.1.ppc64le", "product_id": "tomcat-embed-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-javadoc-9.0.104-1.1.ppc64le", "product_id": "tomcat-javadoc-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "product_id": "tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-jsvc-9.0.104-1.1.ppc64le", "product_id": "tomcat-jsvc-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-lib-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-lib-9.0.104-1.1.ppc64le", "product_id": "tomcat-lib-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "product_id": "tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.104-1.1.ppc64le", "product": { "name": "tomcat-webapps-9.0.104-1.1.ppc64le", "product_id": "tomcat-webapps-9.0.104-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.104-1.1.s390x", "product": { "name": "tomcat-9.0.104-1.1.s390x", "product_id": "tomcat-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.104-1.1.s390x", "product": { "name": "tomcat-admin-webapps-9.0.104-1.1.s390x", "product_id": "tomcat-admin-webapps-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.104-1.1.s390x", "product": { "name": "tomcat-docs-webapp-9.0.104-1.1.s390x", "product_id": "tomcat-docs-webapp-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.104-1.1.s390x", "product": { "name": "tomcat-el-3_0-api-9.0.104-1.1.s390x", "product_id": "tomcat-el-3_0-api-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-embed-9.0.104-1.1.s390x", "product": { "name": "tomcat-embed-9.0.104-1.1.s390x", "product_id": "tomcat-embed-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.104-1.1.s390x", "product": { "name": "tomcat-javadoc-9.0.104-1.1.s390x", "product_id": "tomcat-javadoc-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "product": { "name": "tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "product_id": "tomcat-jsp-2_3-api-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.104-1.1.s390x", "product": { "name": "tomcat-jsvc-9.0.104-1.1.s390x", "product_id": "tomcat-jsvc-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-lib-9.0.104-1.1.s390x", "product": { "name": "tomcat-lib-9.0.104-1.1.s390x", "product_id": "tomcat-lib-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "product": { "name": "tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "product_id": "tomcat-servlet-4_0-api-9.0.104-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.104-1.1.s390x", "product": { "name": "tomcat-webapps-9.0.104-1.1.s390x", "product_id": "tomcat-webapps-9.0.104-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.104-1.1.x86_64", "product": { "name": "tomcat-9.0.104-1.1.x86_64", "product_id": "tomcat-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.104-1.1.x86_64", "product": { "name": "tomcat-admin-webapps-9.0.104-1.1.x86_64", "product_id": "tomcat-admin-webapps-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.104-1.1.x86_64", "product": { "name": "tomcat-docs-webapp-9.0.104-1.1.x86_64", "product_id": "tomcat-docs-webapp-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.104-1.1.x86_64", "product": { "name": "tomcat-el-3_0-api-9.0.104-1.1.x86_64", "product_id": "tomcat-el-3_0-api-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-embed-9.0.104-1.1.x86_64", "product": { "name": "tomcat-embed-9.0.104-1.1.x86_64", "product_id": "tomcat-embed-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.104-1.1.x86_64", "product": { "name": "tomcat-javadoc-9.0.104-1.1.x86_64", "product_id": "tomcat-javadoc-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "product": { "name": "tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "product_id": "tomcat-jsp-2_3-api-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.104-1.1.x86_64", "product": { "name": "tomcat-jsvc-9.0.104-1.1.x86_64", "product_id": "tomcat-jsvc-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-lib-9.0.104-1.1.x86_64", "product": { "name": "tomcat-lib-9.0.104-1.1.x86_64", "product_id": "tomcat-lib-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "product": { "name": "tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "product_id": "tomcat-servlet-4_0-api-9.0.104-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.104-1.1.x86_64", "product": { "name": "tomcat-webapps-9.0.104-1.1.x86_64", "product_id": "tomcat-webapps-9.0.104-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.104-1.1.s390x" }, "product_reference": "tomcat-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-admin-webapps-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-admin-webapps-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.s390x" }, "product_reference": "tomcat-admin-webapps-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-admin-webapps-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-docs-webapp-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-docs-webapp-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.s390x" }, "product_reference": "tomcat-docs-webapp-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-docs-webapp-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-el-3_0-api-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.s390x" }, "product_reference": "tomcat-el-3_0-api-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-el-3_0-api-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-embed-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-embed-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.s390x" }, "product_reference": "tomcat-embed-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-embed-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-javadoc-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-javadoc-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.s390x" }, "product_reference": "tomcat-javadoc-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-javadoc-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.s390x" }, "product_reference": "tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-jsvc-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-jsvc-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.s390x" }, "product_reference": "tomcat-jsvc-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-jsvc-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-lib-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-lib-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.s390x" }, "product_reference": "tomcat-lib-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-lib-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.s390x" }, "product_reference": "tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.104-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.aarch64" }, "product_reference": "tomcat-webapps-9.0.104-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.104-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.ppc64le" }, "product_reference": "tomcat-webapps-9.0.104-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.104-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.s390x" }, "product_reference": "tomcat-webapps-9.0.104-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.104-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.x86_64" }, "product_reference": "tomcat-webapps-9.0.104-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-31650", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-31650" } ], "notes": [ { "category": "general", "text": "Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\n\nThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.90 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-31650", "url": "https://www.suse.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "SUSE Bug 1242008 for CVE-2025-31650", "url": "https://bugzilla.suse.com/1242008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-02T00:00:00Z", "details": "important" } ], "title": "CVE-2025-31650" }, { "cve": "CVE-2025-31651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-31651" } ], "notes": [ { "category": "general", "text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible \nfor a specially crafted request to bypass some rewrite rules. If those \nrewrite rules effectively enforced security constraints, those \nconstraints could be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-31651", "url": "https://www.suse.com/security/cve/CVE-2025-31651" }, { "category": "external", "summary": "SUSE Bug 1242009 for CVE-2025-31651", "url": "https://bugzilla.suse.com/1242009" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.104-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.104-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-02T00:00:00Z", "details": "important" } ], "title": "CVE-2025-31651" } ] }
ghsa-3p2h-wqq4-wf4h
Vulnerability from github
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.
This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.90 though 8.5.100.
Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 9.0.102" }, "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "9.0.76" }, { "fixed": "9.0.104" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "10.1.10" }, { "fixed": "10.1.40" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M2" }, { "fixed": "11.0.6" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 9.0.102" }, "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "9.0.76" }, { "fixed": "9.0.104" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "10.1.10" }, { "fixed": "10.1.40" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M2" }, { "fixed": "11.0.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-coyote" }, "ranges": [ { "events": [ { "introduced": "8.5.0" }, { "last_affected": "8.5.100" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "8.5.0" }, { "last_affected": "8.5.100" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-31650" ], "database_specific": { "cwe_ids": [ "CWE-459", "CWE-460" ], "github_reviewed": true, "github_reviewed_at": "2025-04-29T14:59:22Z", "nvd_published_at": "2025-04-28T20:15:20Z", "severity": "MODERATE" }, "details": "Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.\n\nThis issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.90 though 8.5.100.\n\nUsers are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.", "id": "GHSA-3p2h-wqq4-wf4h", "modified": "2025-08-08T18:52:38Z", "published": "2025-04-28T21:30:43Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/1eef1dc459c45f1e421d8bd25ef340fc1cc34edc" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/40ae788c2e64d018b4e58cd4210bb96434d0100d" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/75554da2fc5574862510ae6f0d7b3d78937f1d40" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/8cc3b8fb3f2d8d4d6a757e014f19d1fafa948a60" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/b7674782679e1514a0d154166b1d04d38aaac4a9" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/b98e74f517b36929f4208506e5adad22cb767baa" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/cba1a0fe1289ee7f5dd46c61c38d1e1ac5437bff" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/ded0285b96b4d3f5560dfc8856ad5ec4a9b50ba9" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/f619e6a05029538886d5a9d987925d573b5bb8c2" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat" }, { "type": "WEB", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-10.html" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-11.html" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-9.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/04/28/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U", "type": "CVSS_V4" } ], "summary": "Apache Tomcat Denial of Service via invalid HTTP priority header" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.