Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:02979-1

Опубликовано: 25 авг. 2025
Источник: suse-cvrf

Описание

Security update for tomcat11

This update for tomcat11 fixes the following issues:

Updated to Tomcat 11.0.9

  • CVE-2025-52520: Fixed integer overflow can lead to DoS for some unlikely configurations of multipart upload (bsc#1246388)
  • CVE-2025-53506: Fixed uncontrolled resource HTTP/2 client consumption vulnerability (bsc#1246318)

Other:

  • Correct a regression in the fix for CVE-2025-49125 that prevented access to PreResources and PostResources when mounted below the web application root with a path that was terminated with a file separator.

Список пакетов

SUSE Linux Enterprise Module for Web and Scripting 15 SP6
tomcat11-11.0.9-150600.13.6.1
tomcat11-admin-webapps-11.0.9-150600.13.6.1
tomcat11-el-6_0-api-11.0.9-150600.13.6.1
tomcat11-jsp-4_0-api-11.0.9-150600.13.6.1
tomcat11-lib-11.0.9-150600.13.6.1
tomcat11-servlet-6_1-api-11.0.9-150600.13.6.1
tomcat11-webapps-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP7
tomcat11-11.0.9-150600.13.6.1
tomcat11-admin-webapps-11.0.9-150600.13.6.1
tomcat11-el-6_0-api-11.0.9-150600.13.6.1
tomcat11-jsp-4_0-api-11.0.9-150600.13.6.1
tomcat11-lib-11.0.9-150600.13.6.1
tomcat11-servlet-6_1-api-11.0.9-150600.13.6.1
tomcat11-webapps-11.0.9-150600.13.6.1
openSUSE Leap 15.6
tomcat11-11.0.9-150600.13.6.1
tomcat11-admin-webapps-11.0.9-150600.13.6.1
tomcat11-doc-11.0.9-150600.13.6.1
tomcat11-docs-webapp-11.0.9-150600.13.6.1
tomcat11-el-6_0-api-11.0.9-150600.13.6.1
tomcat11-embed-11.0.9-150600.13.6.1
tomcat11-jsp-4_0-api-11.0.9-150600.13.6.1
tomcat11-jsvc-11.0.9-150600.13.6.1
tomcat11-lib-11.0.9-150600.13.6.1
tomcat11-servlet-6_1-api-11.0.9-150600.13.6.1
tomcat11-webapps-11.0.9-150600.13.6.1

Описание

Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.


Затронутые продукты
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-admin-webapps-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-el-6_0-api-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-jsp-4_0-api-11.0.9-150600.13.6.1

Ссылки

Описание

For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.


Затронутые продукты
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-admin-webapps-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-el-6_0-api-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-jsp-4_0-api-11.0.9-150600.13.6.1

Ссылки

Описание

Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.


Затронутые продукты
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-admin-webapps-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-el-6_0-api-11.0.9-150600.13.6.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-jsp-4_0-api-11.0.9-150600.13.6.1

Ссылки