Bug 2406588 (CVE-2025-61795)

Summary: CVE-2025-61795 tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Denial of service
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aakkiang, aschwart, asoldano, bbaranow, bmaxwell, boliveir, brian.stansberry, cfu, csutherl, darran.lofthouse, dhanak, dosoudil, drosa, dsirrine, dsoumis, edewata, fjuma, gkimetto, gmalinko, ibek, istudens, ivassile, iweiss, janstey, jclere, jmagne, jrokos, kverlaen, mfargett, mharmsen, mnovotny, mosmerov, mposolda, msvehla, nwallace, pdelbell, pesilva, pjindal, plodge, pmackay, prisingh, rmartinc, rmaucher, rstancel, rstepani, sausingh, sdawley, skhandel, smaestri, ssilvert, sthorger, szappis, taherrin, teagle, tom.jenkinson, vchlup, vmuzikar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A denial of service flaw has been discovered in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2406622, 2406623, 2406624, 2406625, 2406626, 2417223    
Bug Blocks:    

Description OSIDB Bzimport 2025-10-27 18:01:49 UTC
Improper Resource Shutdown or Release vulnerability in Apache Tomcat.

If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.



This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.

The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.

Comment 3 errata-xmlrpc 2025-11-26 15:57:30 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 6.1.3

Via RHSA-2025:19810 https://access.redhat.com/errata/RHSA-2025:19810

Comment 4 errata-xmlrpc 2025-11-26 15:57:46 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 6.1 on RHEL 10
  Red Hat JBoss Web Server 6.1 on RHEL 8
  Red Hat JBoss Web Server 6.1 on RHEL 9

Via RHSA-2025:19809 https://access.redhat.com/errata/RHSA-2025:19809

Comment 5 errata-xmlrpc 2025-12-10 14:34:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2025:23051 https://access.redhat.com/errata/RHSA-2025:23051

Comment 6 errata-xmlrpc 2025-12-10 14:41:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:23050 https://access.redhat.com/errata/RHSA-2025:23050