OESA-2025-2243

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2243
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2243.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-2243
Upstream
Published
2025-09-12T14:24:37Z
Modified
2025-09-12T20:34:07.755514Z
Summary
tomcat security update
Details

Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process.

Security Fix(es):

Apache Tomcat is vulnerable to the made you reset attack due to an Improper Resource Shutdown or Release vulnerability. This issue affects Apache Tomcat versions from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.(CVE-2025-48989)

Session Fixation vulnerability in Apache Tomcat via rewrite valve.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Older, EOL versions may also be affected.

Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.(CVE-2025-55668)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS / tomcat

Package

Name
tomcat
Purl
pkg:rpm/openEuler/tomcat&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.100-8.oe2403

Ecosystem specific

{
    "noarch": [
        "tomcat-9.0.100-8.oe2403.noarch.rpm",
        "tomcat-help-9.0.100-8.oe2403.noarch.rpm",
        "tomcat-jsvc-9.0.100-8.oe2403.noarch.rpm"
    ],
    "src": [
        "tomcat-9.0.100-8.oe2403.src.rpm"
    ]
}