Bug 2362783 (CVE-2025-31650) - CVE-2025-31650 tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [NEEDINFO]
Summary: CVE-2025-31650 tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDAT...
Keywords:
Status: NEW
Alias: CVE-2025-31650
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2363043 2363044 2363045
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-28 20:01 UTC by OSIDB Bzimport
Modified: 2025-05-21 07:02 UTC (History)
11 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:
szappis: needinfo? (pdelbell)
aogburn: needinfo? (prodsec-dev)
aogburn: needinfo? (pdelbell)


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:3608 0 None None None 2025-05-19 10:13:17 UTC
Red Hat Product Errata RHSA-2025:3609 0 None None None 2025-05-19 10:12:59 UTC
Red Hat Product Errata RHSA-2025:4521 0 None None None 2025-05-19 10:13:35 UTC
Red Hat Product Errata RHSA-2025:4522 0 None None None 2025-05-19 10:13:26 UTC

Description OSIDB Bzimport 2025-04-28 20:01:21 UTC
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.

This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.

Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.

Comment 8 VIRENDRASINGH RAJPUT 2025-05-12 07:13:31 UTC
Hi Engineering Team,

One of the below account too looking for an update and asking to prioritize the fix for this CVE for RHEL 8:

Account Name	ACE-IT/LOCKEED MARTIN	
Account Number	1203914	

Thank You!!

Comment 12 errata-xmlrpc 2025-05-19 10:12:57 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server

Via RHSA-2025:3609 https://access.redhat.com/errata/RHSA-2025:3609

Comment 13 errata-xmlrpc 2025-05-19 10:13:14 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 6.1 on RHEL 8
  Red Hat JBoss Web Server 6.1 on RHEL 9

Via RHSA-2025:3608 https://access.redhat.com/errata/RHSA-2025:3608

Comment 14 errata-xmlrpc 2025-05-19 10:13:24 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server

Via RHSA-2025:4522 https://access.redhat.com/errata/RHSA-2025:4522

Comment 15 errata-xmlrpc 2025-05-19 10:13:32 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 5.8 on RHEL 7
  Red Hat JBoss Web Server 5.8 on RHEL 8
  Red Hat JBoss Web Server 5.8 on RHEL 9

Via RHSA-2025:4521 https://access.redhat.com/errata/RHSA-2025:4521


Note You need to log in before you can comment on or make changes to this bug.