OESA-2025-1816

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1816
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1816.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1816
Upstream
Published
2025-07-11T12:24:28Z
Modified
2025-08-12T05:51:31.893213Z
Summary
tomcat security update
Details

Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process.

Security Fix(es):

Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload.

This issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4.

Users are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue.(CVE-2025-48976)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.

Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.(CVE-2025-49125)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP2 / tomcat

Package

Name
tomcat
Purl
pkg:rpm/openEuler/tomcat&distro=openEuler-24.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.100-5.oe2403sp2

Ecosystem specific

{
    "src": [
        "tomcat-9.0.100-5.oe2403sp2.src.rpm"
    ],
    "noarch": [
        "tomcat-9.0.100-5.oe2403sp2.noarch.rpm",
        "tomcat-help-9.0.100-5.oe2403sp2.noarch.rpm",
        "tomcat-jsvc-9.0.100-5.oe2403sp2.noarch.rpm"
    ]
}