Mark, Is this accurate? Versions Affected: Apache Tomcat 10.1.0-M1 to 10.1.42
Mitigation: - Upgrade to Apache Tomcat 10.1.32 or later Thanks! -Joey [cid:d114c52d-730d-4ed5-9b19-db4e930e1068] Joey Cochran Systems Administrator II Middleware Developer Information Technology Division Middle Tennessee State University 615-898-2714 www.mtsu.edu ________________________________ From: Mark Thomas <ma...@apache.org> Sent: Thursday, July 10, 2025 1:56 PM To: Tomcat Users List <users@tomcat.apache.org> Cc: annou...@apache.org <annou...@apache.org>; annou...@tomcat.apache.org <annou...@tomcat.apache.org>; Tomcat Developers List <d...@tomcat.apache.org> Subject: [EXTERNAL] [SECURITY] CVE-2025-52520 Apache Tomcat - DoS in multipart upload CVE-2025-52520 Apache Tomcat - DoS in multipart upload Severity: Low Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 11.0.0-M1 to 11.0.8 Apache Tomcat 10.1.0-M1 to 10.1.42 Apache Tomcat 9.0.0.M1 to 9.0.106 Description: For some unlikely configurations of multipart upload, an Integer Overflow vulnerability could lead to a DoS via bypassing of size limits. Mitigation: Users of the affected versions should apply one of the following mitigations: - Upgrade to Apache Tomcat 11.0.9 or later - Upgrade to Apache Tomcat 10.1.32 or later - Upgrade to Apache Tomcat 9.0.107 or later Credit: The vulnerability was identified by Saravana Kumar History: 2025-07-10 Original advisory References: [1] https://tomcat.apache.org/security-11.html [2] https://tomcat.apache.org/security-10.html [3] https://tomcat.apache.org/security-9.html --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org For additional commands, e-mail: users-h...@tomcat.apache.org