ALT-BU-2025-9993-3
Branch c10f2 update bulletin.
Closed vulnerabilities
Modified: 2026-04-20
BDU:2025-07526
Уязвимость сервера приложений Apache Tomcat, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2025-07776
Уязвимость библиотеки Apache Commons FileUpload, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-04-20
BDU:2025-09498
Уязвимость компонента компоненте pathInfo URI сервера приложений Apache Tomcat, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-11-03
CVE-2025-46701
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
Modified: 2025-11-03
CVE-2025-48976
Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload. This issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4. Users are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue.
Modified: 2025-11-03
CVE-2025-48988
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
Modified: 2025-11-04
GHSA-h2fw-rfh5-95r3
Apache Tomcat - CGI security constraint bypass
- https://nvd.nist.gov/vuln/detail/CVE-2025-46701
- https://github.com/apache/tomcat/commit/0f01966eb60015d975525019e12a087f05ebf01a
- https://github.com/apache/tomcat/commit/238d2aa54b99f91d1111467e2237d2244c64e558
- https://github.com/apache/tomcat/commit/2c6800111e7d8d8d5403c07978ea9bff3db5a5a5
- https://github.com/apache/tomcat/commit/8cb95ff03221067c511b3fa66d4f745bc4b0a605
- https://github.com/apache/tomcat/commit/8df00018a252baa9497615d6420fb6c10466fa74
- https://github.com/apache/tomcat/commit/fab7247d2f0e3a29d5daef565f829f383e10e5e2
- https://github.com/apache/tomcat
- https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j
- https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html
- https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.41
- https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.7
- https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.105
- http://www.openwall.com/lists/oss-security/2025/05/29/4
Modified: 2025-11-04
GHSA-h3gc-qfqq-6h8f
Apache Tomcat - DoS in multipart upload
- https://nvd.nist.gov/vuln/detail/CVE-2025-48988
- https://github.com/apache/tomcat/commit/2b0ab14fb55d4edc896e5f1817f2ab76f714ae5e
- https://github.com/apache/tomcat/commit/cdde8e655bc1c5c60a07efd216251d77c52fd7f6
- https://github.com/apache/tomcat/commit/ee8042ffce4cb9324dfd79efda5984f37bbb6910
- https://github.com/apache/tomcat
- https://lists.apache.org/thread/nzkqsok8t42qofgqfmck536mtyzygp18
- https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html
- https://tomcat.apache.org/security-10.html
- https://tomcat.apache.org/security-11.html
- https://tomcat.apache.org/security-9.html
- http://www.openwall.com/lists/oss-security/2025/06/16/1
Modified: 2025-11-04
GHSA-vv7r-c36w-3prj
Apache Commons FileUpload, Apache Commons FileUpload: FileUpload DoS via part headers
- https://nvd.nist.gov/vuln/detail/CVE-2025-48976
- https://github.com/apache/commons-fileupload/commit/b247774a72a044f5d5380ae947140ee80af4e78b
- https://github.com/apache/commons-fileupload/commit/bf68f63cfb312ef4710fb3dfb4d8e4e1665f4497
- https://github.com/apache/tomcat/commit/97790a35a27d236fa053e660676c3f8196284d93
- https://github.com/apache/commons-fileupload
- https://lists.apache.org/thread/fbs3wrr3p67vkjcxogqqqqz45pqtso12
- https://lists.debian.org/debian-lts-announce/2025/07/msg00008.html
- https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html
- http://www.openwall.com/lists/oss-security/2025/06/16/4
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-14274
MCPP 2.7.2 has a heap-based buffer overflow in the do_msg() function in support.c.
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00038.html
- https://security.gentoo.org/glsa/202208-04
- https://sourceforge.net/p/mcpp/bugs/13/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00038.html
- https://security.gentoo.org/glsa/202208-04
- https://sourceforge.net/p/mcpp/bugs/13/
