Skip to content

Commit d6ecb4b

Browse files
Merge pull request #5800 from github/fabien-chebel-GHSA-25xr-qj8w-c4vf
2 parents fc48451 + 7fdf0f8 commit d6ecb4b

File tree

1 file changed

+145
-3
lines changed

1 file changed

+145
-3
lines changed

advisories/unreviewed/2025/07/GHSA-25xr-qj8w-c4vf/GHSA-25xr-qj8w-c4vf.json

Lines changed: 145 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,161 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-25xr-qj8w-c4vf",
4-
"modified": "2025-07-10T21:31:53Z",
4+
"modified": "2025-07-10T21:31:59Z",
55
"published": "2025-07-10T21:31:53Z",
66
"aliases": [
77
"CVE-2025-53506"
88
],
9+
"summary": "DoS via excessive HTTP/2 streams",
910
"details": "Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.\n\nUsers are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.",
1011
"severity": [],
11-
"affected": [],
12+
"affected": [
13+
{
14+
"package": {
15+
"ecosystem": "Maven",
16+
"name": "org.apache.tomcat:tomcat-catalina"
17+
},
18+
"ranges": [
19+
{
20+
"type": "ECOSYSTEM",
21+
"events": [
22+
{
23+
"introduced": "11.0.0-M1"
24+
},
25+
{
26+
"fixed": "11.0.9"
27+
}
28+
]
29+
}
30+
],
31+
"database_specific": {
32+
"last_known_affected_version_range": "<= 11.0.8"
33+
}
34+
},
35+
{
36+
"package": {
37+
"ecosystem": "Maven",
38+
"name": "org.apache.tomcat:tomcat-catalina"
39+
},
40+
"ranges": [
41+
{
42+
"type": "ECOSYSTEM",
43+
"events": [
44+
{
45+
"introduced": "10.1.0-M1"
46+
},
47+
{
48+
"fixed": "10.1.43"
49+
}
50+
]
51+
}
52+
],
53+
"database_specific": {
54+
"last_known_affected_version_range": "<= 10.1.42"
55+
}
56+
},
57+
{
58+
"package": {
59+
"ecosystem": "Maven",
60+
"name": "org.apache.tomcat:tomcat-catalina"
61+
},
62+
"ranges": [
63+
{
64+
"type": "ECOSYSTEM",
65+
"events": [
66+
{
67+
"introduced": "9.0.0.M1"
68+
},
69+
{
70+
"fixed": "9.0.107"
71+
}
72+
]
73+
}
74+
],
75+
"database_specific": {
76+
"last_known_affected_version_range": "<= 9.0.106"
77+
}
78+
},
79+
{
80+
"package": {
81+
"ecosystem": "Maven",
82+
"name": "org.apache.tomcat.embed:tomcat-embed-core"
83+
},
84+
"ranges": [
85+
{
86+
"type": "ECOSYSTEM",
87+
"events": [
88+
{
89+
"introduced": "11.0.0-M1"
90+
},
91+
{
92+
"fixed": "11.0.9"
93+
}
94+
]
95+
}
96+
],
97+
"database_specific": {
98+
"last_known_affected_version_range": "<= 11.0.8"
99+
}
100+
},
101+
{
102+
"package": {
103+
"ecosystem": "Maven",
104+
"name": "org.apache.tomcat.embed:tomcat-embed-core"
105+
},
106+
"ranges": [
107+
{
108+
"type": "ECOSYSTEM",
109+
"events": [
110+
{
111+
"introduced": "10.1.0-M1"
112+
},
113+
{
114+
"fixed": "10.1.43"
115+
}
116+
]
117+
}
118+
],
119+
"database_specific": {
120+
"last_known_affected_version_range": "<= 10.1.42"
121+
}
122+
},
123+
{
124+
"package": {
125+
"ecosystem": "Maven",
126+
"name": "org.apache.tomcat.embed:tomcat-embed-core"
127+
},
128+
"ranges": [
129+
{
130+
"type": "ECOSYSTEM",
131+
"events": [
132+
{
133+
"introduced": "9.0.0.M1"
134+
},
135+
{
136+
"fixed": "9.0.107"
137+
}
138+
]
139+
}
140+
],
141+
"database_specific": {
142+
"last_known_affected_version_range": "<= 9.0.106"
143+
}
144+
}
145+
],
12146
"references": [
13147
{
14148
"type": "ADVISORY",
15149
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53506"
16150
},
151+
{
152+
"type": "WEB",
153+
"url": "https://github.com/apache/tomcat/commit/2aa6261276ebe50b99276953591e3a2be7898bdb"
154+
},
155+
{
156+
"type": "PACKAGE",
157+
"url": "https://github.com/apache/tomcat"
158+
},
17159
{
18160
"type": "WEB",
19161
"url": "https://lists.apache.org/thread/p09775q0rd185m6zz98krg0fp45j8kr0"
@@ -23,7 +165,7 @@
23165
"cwe_ids": [
24166
"CWE-400"
25167
],
26-
"severity": null,
168+
"severity": "HIGH",
27169
"github_reviewed": false,
28170
"github_reviewed_at": null,
29171
"nvd_published_at": "2025-07-10T20:15:26Z"

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy