RLSA-2025:23052

Source
https://errata.rockylinux.org/RLSA-2025:23052
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2025:23052.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2025:23052
Upstream
Published
2025-12-12T09:08:37.000745Z
Modified
2025-12-12T09:29:52.412700Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: tomcat9 security update
Details

Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.

Security Fix(es):

  • tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651)

  • tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / tomcat9

Package

Name
tomcat9
Purl
pkg:rpm/rocky-linux/tomcat9?distro=rocky-linux-10-aarch64&epoch=1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.0.87-8.el10_1.1
Database specific
{
    "yum_repository": "AppStream"
}