Author: markt
Date: Mon Apr 28 19:08:20 2025
New Revision: 1925313

URL: http://svn.apache.org/viewvc?rev=1925313&view=rev
Log:
CVE-2025-31650 and CVE-2025-2025-31651

Modified:
    tomcat/site/trunk/docs/security-10.html
    tomcat/site/trunk/docs/security-11.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-10.xml
    tomcat/site/trunk/xdocs/security-11.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-10.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1925313&r1=1925312&r2=1925313&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-10.html (original)
+++ tomcat/site/trunk/docs/security-10.html Mon Apr 28 19:08:20 2025
@@ -42,7 +42,40 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache Tomcat 
10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache 
Tomcat 10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in 
Apache Tomcat 10.1.33</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat 
10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache 
Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in 
Apache Tomcat 10.1.19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat 
10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache 
Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in 
Apache Tomcat 10.1.13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 
10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache 
Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apac
 he Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in 
Apache Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed 
in Apache Tomcat 10.1.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache Tomcat 
10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache 
Tomcat 10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in 
Apache Tomcat 10.0.23</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 
10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in 
Apache Tomcat 10.0.21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 
10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in 
Apache Tomcat 10.0.20</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 
10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in 
Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Ap
 ache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache 
Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in 
Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed 
in Apache Tomcat 10.0.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache 
Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in 
Apache Tomcat 10.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in 
Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10
 .0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in 
Apache Tomcat 10.0.0-M5</a></li><li><a 
href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in Apache Tomcat 
10.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache 
Tomcat 10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in 
Apache Tomcat 10.1.34</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache Tomcat 
10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache 
Tomcat 10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in 
Apache Tomcat 10.1.25</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache Tomcat 
10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache 
Tomcat 10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in 
Apache Tomcat 10.1.14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 
10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache 
Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Ap
 ache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed 
in Apache Tomcat 10.1.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 
10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache 
Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in 
Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed 
in Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a href="#Fixed_in_Ap
 ache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 
10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in 
Apache Tomcat 10.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache 
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in 
Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed 
in Apache Tomcat 10.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 
10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache 
Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in 
Apache Tomcat 10.0.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 
10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in 
Apache Tomcat 10.0.0
 -M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache 
Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed 
in Apache Tomcat 10.0.0-M5</a></li><li><a 
href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.40"><span 
class="pull-right">2025-04-08</span> Fixed in Apache Tomcat 10.1.40</h3><div 
class="text">
+
+    <p><strong>Low: Rewrite rule bypass</strong> <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31651"; 
rel="nofollow">CVE-2025-31651</a></p>
+
+    <p>For a subset of unlikely rewrite rule configurations, it was possible 
for
+       a specially crafted request to bypass some rewrite rules. If those
+       rewrite rules effectively enforced security constraints, those
+       constraints could be bypassed.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/066bf6b6a15a4e7e0941d4acf096841165b97098";>066bf6b6</a>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.39</p>
+
+    <p><strong>Important: Denial of Service via invalid HTTP priority
+       header</strong> <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31650"; 
rel="nofollow">CVE-2025-31650</a></p>
+
+    <p>Incorrect error handling for some invalid HTTP priority headers resulted
+       in incomplete clean-up of the failed request which created a memory 
leak.
+       A large number of such requests could trigger an
+       OutOfMemoryException resulting in a denial of service.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/cba1a0fe1289ee7f5dd46c61c38d1e1ac5437bff";>cba1a0fe</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/1eef1dc459c45f1e421d8bd25ef340fc1cc34edc";>1eef1dc4</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/8cc3b8fb3f2d8d4d6a757e014f19d1fafa948a60";>8cc3b8fb</a>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 10.1.10 to 10.1.39</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_10.1.35"><span 
class="pull-right">2025-02-10</span> Fixed in Apache Tomcat 10.1.35</h3><div 
class="text">
   
     <p><strong>Important: Remote Code Execution and/or Information disclosure

Modified: tomcat/site/trunk/docs/security-11.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1925313&r1=1925312&r2=1925313&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-11.html (original)
+++ tomcat/site/trunk/docs/security-11.html Mon Apr 28 19:08:20 2025
@@ -36,7 +36,40 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache Tomcat 
11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache 
Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in 
Apache Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed 
in Apache Tomcat 11.0.0</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomcat 
11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in 
Apache Tomcat 11.0.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 
11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in 
Apache Tomcat 11.0.0-M11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 
11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in 
Apache Tomcat 11.0.0-M5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 
11.0.0-M3</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache Tomcat 
11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache 
Tomcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in 
Apache Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed 
in Apache Tomcat 11.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache Tomcat 
11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache 
Tomcat 11.0.0-M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in 
Apache Tomcat 11.0.0-M12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in 
Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_To
 mcat_11.0.0-M3">Fixed in Apache Tomcat 11.0.0-M3</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.6"><span 
class="pull-right">2025-04-09</span> Fixed in Apache Tomcat 11.0.6</h3><div 
class="text">
+
+    <p><strong>Low: Rewrite rule bypass</strong> <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31651"; 
rel="nofollow">CVE-2025-31651</a></p>
+
+    <p>For a subset of unlikely rewrite rule configurations, it was possible 
for
+       a specially crafted request to bypass some rewrite rules. If those
+       rewrite rules effectively enforced security constraints, those
+       constraints could be bypassed.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/fbecc915a10c5a3d634c5e2c6ced4ff479ce9953";>fbecc915</a>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.5</p>
+
+    <p><strong>Important: Denial of Service via invalid HTTP priority
+       header</strong> <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31650"; 
rel="nofollow">CVE-2025-31650</a></p>
+
+    <p>Incorrect error handling for some invalid HTTP priority headers resulted
+       in incomplete clean-up of the failed request which created a memory 
leak.
+       A large number of such requests could trigger an
+       OutOfMemoryException resulting in a denial of service.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/75554da2fc5574862510ae6f0d7b3d78937f1d40";>75554da2</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/f619e6a05029538886d5a9d987925d573b5bb8c2";>f619e6a0</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/ded0285b96b4d3f5560dfc8856ad5ec4a9b50ba9";>ded0285b</a>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 11.0.0-M2 to 11.0.5</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_11.0.3"><span 
class="pull-right">2025-02-10</span> Fixed in Apache Tomcat 11.0.3</h3><div 
class="text">
   
     <p><strong>Important: Remote Code Execution and/or Information disclosure

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1925313&r1=1925312&r2=1925313&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Mon Apr 28 19:08:20 2025
@@ -36,7 +36,47 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache Tomcat 
9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache 
Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in 
Apache Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed 
in Apache Tomcat 9.0.96</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache Tomcat 
9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache 
Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in 
Apache Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed 
in Apache Tomcat 9.0.81</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache Tomcat 
9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache 
Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in 
Apache Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed 
in Apache Tomcat 9.0.72</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache Tomcat 
9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache 
Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in 
Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed 
in Apache Tomcat 9.0.65</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 
9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache 
Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in 
Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed 
in Apache Tomcat 9.0.54</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 
9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache 
Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in 
Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed 
in Apache Tomcat 9.0.44</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 
 >9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache 
 >Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in 
 >Apache Tomcat 9.0.38</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 
 >9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache 
 >Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in 
 >Apache Tomcat 9.0.35</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 
 >9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache 
 >Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in 
 >Apache Tomcat 9.0.29</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat 
 >9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache 
 >Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in 
 >Apache Tomcat 9.0.19</a>
 </li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat 
9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache 
Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in 
Apache Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed 
in Apache Tomcat 9.0.9</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache Tomcat 
9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache 
Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in 
Apache Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed 
in Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
Apache Tomcat 
 9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in 
Apache Tomcat 9.0.0.M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 
9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in 
Apache Tomcat 9.0.0.M13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in Apache Tomcat 
9.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache 
Tomcat 9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in 
Apache Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed 
in Apache Tomcat 9.0.97</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache Tomcat 
9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache 
Tomcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in 
Apache Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed 
in Apache Tomcat 9.0.83</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache Tomcat 
9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache 
Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in 
Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed 
in Apache Tomcat 9.0.74
 </a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat 
9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache 
Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in 
Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed 
in Apache Tomcat 9.0.68</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 
9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache 
Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in 
Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed 
in Apache Tomcat 9.0.58</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 
9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache 
Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in 
Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed 
in Apache Tomcat 9.0.45<
 /a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 
9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache 
Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in 
Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed 
in Apache Tomcat 9.0.38</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 
9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache 
Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in 
Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed 
in Apache Tomcat 9.0.31</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 
9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache 
Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in 
Apache Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed 
in Apache Tomcat 9.0.20</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 
9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache 
Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in 
Apache Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed 
in Apache Tomcat 9.0.10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat 
9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache 
Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in 
Apache Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed 
in Apache Tomcat 9.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat 
9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache 
Tomcat 9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed 
in Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 9.0.
 0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache 
Tomcat 9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed 
in Apache Tomcat 9.0.0.M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 
9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in 
Apache Tomcat 9.0.0.M13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.104"><span 
class="pull-right">2025-04-08</span> Fixed in Apache Tomcat 9.0.104</h3><div 
class="text">
+
+    <p><i>Note: The issues below were fixed in Apache Tomcat 9.0.103 but the
+       release vote for the 9.0.103 release candidate did not pass. Therefore,
+       although users must download 9.0.104 to obtain a version that includes a
+       fix for these issues, version 9.0.103 is not included in the list of 
+       affected versions.</i></p>
+
+    <p><strong>Low: Rewrite rule bypass</strong> <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31651"; 
rel="nofollow">CVE-2025-31651</a></p>
+
+    <p>For a subset of unlikely rewrite rule configurations, it was possible 
for
+       a specially crafted request to bypass some rewrite rules. If those
+       rewrite rules effectively enforced security constraints, those
+       constraints could be bypassed.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/ee3ab548e92345eca0cbd1f01649eb36c6f29454";>ee3ab548</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/175dc75fc428930034a6c93fb52f830d955d8e64";>175dc75f</a>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.102</p>
+
+    <p><strong>Important: Denial of Service via invalid HTTP priority
+       header</strong> <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31650"; 
rel="nofollow">CVE-2025-31650</a></p>
+
+    <p>Incorrect error handling for some invalid HTTP priority headers resulted
+       in incomplete clean-up of the failed request which created a memory 
leak.
+       A large number of such requests could trigger an
+       OutOfMemoryException resulting in a denial of service.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/40ae788c2e64d018b4e58cd4210bb96434d0100d";>40ae788c</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/b98e74f517b36929f4208506e5adad22cb767baa";>b98e74f5</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/b7674782679e1514a0d154166b1d04d38aaac4a9";>b7674782</a>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 9.0.76 to 9.0.102</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.99"><span 
class="pull-right">2025-02-10</span> Fixed in Apache Tomcat 9.0.99</h3><div 
class="text">
   
     <p><strong>Important: Remote Code Execution and/or Information disclosure

Modified: tomcat/site/trunk/xdocs/security-10.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1925313&r1=1925312&r2=1925313&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml (original)
+++ tomcat/site/trunk/xdocs/security-10.xml Mon Apr 28 19:08:20 2025
@@ -56,6 +56,41 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 10.1.40" rtext="2025-04-08">
+
+    <p><strong>Low: Rewrite rule bypass</strong> <cve>CVE-2025-31651</cve></p>
+
+    <p>For a subset of unlikely rewrite rule configurations, it was possible 
for
+       a specially crafted request to bypass some rewrite rules. If those
+       rewrite rules effectively enforced security constraints, those
+       constraints could be bypassed.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="066bf6b6a15a4e7e0941d4acf096841165b97098"/>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.39</p>
+
+    <p><strong>Important: Denial of Service via invalid HTTP priority
+       header</strong> <cve>CVE-2025-31650</cve></p>
+
+    <p>Incorrect error handling for some invalid HTTP priority headers resulted
+       in incomplete clean-up of the failed request which created a memory 
leak.
+       A large number of such requests could trigger an
+       OutOfMemoryException resulting in a denial of service.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="cba1a0fe1289ee7f5dd46c61c38d1e1ac5437bff"/>,
+       <hashlink hash="1eef1dc459c45f1e421d8bd25ef340fc1cc34edc"/> and
+       <hashlink hash="8cc3b8fb3f2d8d4d6a757e014f19d1fafa948a60"/>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 10.1.10 to 10.1.39</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 10.1.35" rtext="2025-02-10">
   
     <p><strong>Important: Remote Code Execution and/or Information disclosure

Modified: tomcat/site/trunk/xdocs/security-11.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1925313&r1=1925312&r2=1925313&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml (original)
+++ tomcat/site/trunk/xdocs/security-11.xml Mon Apr 28 19:08:20 2025
@@ -50,6 +50,41 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 11.0.6" rtext="2025-04-09">
+
+    <p><strong>Low: Rewrite rule bypass</strong> <cve>CVE-2025-31651</cve></p>
+
+    <p>For a subset of unlikely rewrite rule configurations, it was possible 
for
+       a specially crafted request to bypass some rewrite rules. If those
+       rewrite rules effectively enforced security constraints, those
+       constraints could be bypassed.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="fbecc915a10c5a3d634c5e2c6ced4ff479ce9953"/>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.5</p>
+
+    <p><strong>Important: Denial of Service via invalid HTTP priority
+       header</strong> <cve>CVE-2025-31650</cve></p>
+
+    <p>Incorrect error handling for some invalid HTTP priority headers resulted
+       in incomplete clean-up of the failed request which created a memory 
leak.
+       A large number of such requests could trigger an
+       OutOfMemoryException resulting in a denial of service.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="75554da2fc5574862510ae6f0d7b3d78937f1d40"/>,
+       <hashlink hash="f619e6a05029538886d5a9d987925d573b5bb8c2"/> and
+       <hashlink hash="ded0285b96b4d3f5560dfc8856ad5ec4a9b50ba9"/>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 11.0.0-M2 to 11.0.5</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 11.0.3" rtext="2025-02-10">
   
     <p><strong>Important: Remote Code Execution and/or Information disclosure

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1925313&r1=1925312&r2=1925313&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Mon Apr 28 19:08:20 2025
@@ -50,6 +50,48 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.104" rtext="2025-04-08">
+
+    <p><i>Note: The issues below were fixed in Apache Tomcat 9.0.103 but the
+       release vote for the 9.0.103 release candidate did not pass. Therefore,
+       although users must download 9.0.104 to obtain a version that includes a
+       fix for these issues, version 9.0.103 is not included in the list of 
+       affected versions.</i></p>
+
+    <p><strong>Low: Rewrite rule bypass</strong> <cve>CVE-2025-31651</cve></p>
+
+    <p>For a subset of unlikely rewrite rule configurations, it was possible 
for
+       a specially crafted request to bypass some rewrite rules. If those
+       rewrite rules effectively enforced security constraints, those
+       constraints could be bypassed.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="ee3ab548e92345eca0cbd1f01649eb36c6f29454"/> and
+       <hashlink hash="175dc75fc428930034a6c93fb52f830d955d8e64"/>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.102</p>
+
+    <p><strong>Important: Denial of Service via invalid HTTP priority
+       header</strong> <cve>CVE-2025-31650</cve></p>
+
+    <p>Incorrect error handling for some invalid HTTP priority headers resulted
+       in incomplete clean-up of the failed request which created a memory 
leak.
+       A large number of such requests could trigger an
+       OutOfMemoryException resulting in a denial of service.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="40ae788c2e64d018b4e58cd4210bb96434d0100d"/>,
+       <hashlink hash="b98e74f517b36929f4208506e5adad22cb767baa"/> and
+       <hashlink hash="b7674782679e1514a0d154166b1d04d38aaac4a9"/>.</p>
+
+    <p>The issue was made public on 28 April 2025.</p>
+
+    <p>Affects: 9.0.76 to 9.0.102</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 9.0.99" rtext="2025-02-10">
   
     <p><strong>Important: Remote Code Execution and/or Information disclosure



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to