Mark,
Is this accurate?

Versions Affected:
Apache Tomcat 10.1.0-M1 to 10.1.42

Mitigation:
- Upgrade to Apache Tomcat 10.1.32 or later



Thanks!

-Joey



           [cid:d114c52d-730d-4ed5-9b19-db4e930e1068]

Joey Cochran

Systems Administrator II

Middleware Developer

Information Technology Division

Middle Tennessee State University

615-898-2714

www.mtsu.edu






________________________________
From: Mark Thomas <ma...@apache.org>
Sent: Thursday, July 10, 2025 1:56 PM
To: Tomcat Users List <users@tomcat.apache.org>
Cc: annou...@apache.org <annou...@apache.org>; annou...@tomcat.apache.org 
<annou...@tomcat.apache.org>; Tomcat Developers List <d...@tomcat.apache.org>
Subject: [EXTERNAL] [SECURITY] CVE-2025-52520 Apache Tomcat - DoS in multipart 
upload

CVE-2025-52520 Apache Tomcat - DoS in multipart upload

Severity: Low

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat 11.0.0-M1 to 11.0.8
Apache Tomcat 10.1.0-M1 to 10.1.42
Apache Tomcat 9.0.0.M1 to 9.0.106

Description:
For some unlikely configurations of multipart upload, an Integer
Overflow vulnerability could lead to a DoS via bypassing of size limits.

Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 11.0.9 or later
- Upgrade to Apache Tomcat 10.1.32 or later
- Upgrade to Apache Tomcat 9.0.107 or later

Credit:
The vulnerability was identified by Saravana Kumar

History:
2025-07-10 Original advisory

References:
[1] https://tomcat.apache.org/security-11.html
[2] https://tomcat.apache.org/security-10.html
[3] https://tomcat.apache.org/security-9.html

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to