RLSA-2025:14178

Source
https://errata.rockylinux.org/RLSA-2025:14178
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2025:14178.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2025:14178
Upstream
Published
2025-10-03T19:56:45.270310Z
Modified
2025-10-08T17:12:48.482776Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Important: tomcat9 security update
Details

Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.

Security Fix(es):

  • tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988)

  • tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125)

  • apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976)

  • tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989)

  • tomcat: Apache Tomcat denial of service (CVE-2025-52520)

  • tomcat: Apache Tomcat denial of service (CVE-2025-52434)

  • tomcat: Apache Tomcat denial of service (CVE-2025-53506)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / tomcat9

Package

Name
tomcat9
Purl
pkg:rpm/rocky-linux/tomcat9?distro=rocky-linux-10-0-aarch64&epoch=1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.0.87-5.el10_0.3