Modified: tomcat/site/trunk/docs/security-10.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1927120&r1=1927119&r2=1927120&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-10.html (original)
+++ tomcat/site/trunk/docs/security-10.html Thu Jul 10 18:55:09 2025
@@ -42,7 +42,36 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in Apache Tomcat 
10.1.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache 
Tomcat 10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in 
Apache Tomcat 10.1.40</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache Tomcat 
10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache 
Tomcat 10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in 
Apache Tomcat 10.1.33</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat 
10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache 
Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in 
Apache Tomcat 10.1.19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat 
10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache 
Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in
  Apache Tomcat 10.1.13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 
10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache 
Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in 
Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed 
in Apache Tomcat 10.1.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache 
Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in 
Apache Tomcat 10.0.27</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 
10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in 
Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_T
 omcat_10.0.20">Fixed in Apache Tomcat 10.0.20</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 
10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in 
Apache Tomcat 10.0.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 
10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in 
Apache Tomcat 10.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache 
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in 
Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed 
in Apache Tomcat 10.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 
10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache 
Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in 
Apache Tomcat 10.0.0-M10</a><
 /li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 
10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in 
Apache Tomcat 10.0.0-M7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 
10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in 
Apache Tomcat 10.0.0-M5</a></li><li><a 
href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in 
Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in Apache Tomcat 
10.1.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in Apache 
Tomcat 10.1.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in 
Apache Tomcat 10.1.41</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in Apache Tomcat 
10.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache 
Tomcat 10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in 
Apache Tomcat 10.1.34</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache Tomcat 
10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache 
Tomcat 10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in 
Apache Tomcat 10.1.25</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache Tomcat 
10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache 
Tomcat 10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in
  Apache Tomcat 10.1.14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 
10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache 
Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in 
Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed 
in Apache Tomcat 10.1.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 
10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache 
Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in 
Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed 
in Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_
 10.1.0-M15">Fixed in Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache 
Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in 
Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed 
in Apache Tomcat 10.0.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache 
Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in 
Apache Tomcat 10.0.2</a></li><l
 i><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in 
Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.43"><span 
class="pull-right">2025-07-04</span> Fixed in Apache Tomcat 10.1.43</h3><div 
class="text">
+
+    <p><strong>Low: DoS due to overflow in file upload limit</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52520"; 
rel="nofollow">CVE-2025-52520</a></p>
+
+    <p>For some unlikely configurations of multipart upload, an Integer 
Overflow
+       vulnerability could lead to a DoS via bypassing of size limits.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/fc42bbccb9041fafd194fbfdf3eab1d44cb5c45c";>fc42bbcc</a>.</p>
+
+    <p>The issue was made public on 10 July 2025.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.42</p>
+
+    <p><strong>Important: DoS via excessive HTTP/2 streams</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53506"; 
rel="nofollow">CVE-2025-53506</a></p>
+
+    <p>An uncontrolled resource consumption vulnerability if an HTTP/2 client
+       did not acknowledge the initial settings frame that reduces the maximum
+       permitted concurrent streams could result in a DoS.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/2aa6261276ebe50b99276953591e3a2be7898bdb";>2aa62612</a>.</p>
+
+    <p>The issue was made public on 10 July 2025.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.42</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_10.1.42"><span 
class="pull-right">2025-06-09</span> Fixed in Apache Tomcat 10.1.42</h3><div 
class="text">
   
     <p><strong>Moderate: Security constraint bypass for PreResources and

Modified: tomcat/site/trunk/docs/security-11.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1927120&r1=1927119&r2=1927120&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-11.html (original)
+++ tomcat/site/trunk/docs/security-11.html Thu Jul 10 18:55:09 2025
@@ -36,7 +36,36 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed in Apache Tomcat 
11.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed in Apache 
Tomcat 11.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in 
Apache Tomcat 11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed 
in Apache Tomcat 11.0.3</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache Tomcat 
11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache 
Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in 
Apache Tomcat 11.0.0</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomcat 
11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in 
Apache Tomcat 11.0.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 
11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in 
Apache Tomcat 11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-
 M6">Fixed in Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in 
Apache Tomcat 11.0.0-M3</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in Apache Tomcat 
11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed in Apache 
Tomcat 11.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed in 
Apache Tomcat 11.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed 
in Apache Tomcat 11.0.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache Tomcat 
11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache 
Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in 
Apache Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed 
in Apache Tomcat 11.0.0</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomcat 
11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in 
Apache Tomcat 11.0.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 
11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fix
 ed in Apache Tomcat 11.0.0-M11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 
11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in 
Apache Tomcat 11.0.0-M5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 
11.0.0-M3</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.9"><span 
class="pull-right">2025-07-04</span> Fixed in Apache Tomcat 11.0.9</h3><div 
class="text">
+
+    <p><strong>Low: DoS due to overflow in file upload limit</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52520"; 
rel="nofollow">CVE-2025-52520</a></p>
+
+    <p>For some unlikely configurations of multipart upload, an Integer 
Overflow
+       vulnerability could lead to a DoS via bypassing of size limits.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/a51e4bedccfafd35b7cdd0ee3e22267dee9f90db";>a51e4bed</a>.</p>
+
+    <p>The issue was made public on 10 July 2025.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.8</p>
+
+    <p><strong>Important: DoS via excessive HTTP/2 streams</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53506"; 
rel="nofollow">CVE-2025-53506</a></p>
+
+    <p>An uncontrolled resource consumption vulnerability if an HTTP/2 client
+       did not acknowledge the initial settings frame that reduces the maximum
+       permitted concurrent streams could result in a DoS.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/be8f330f83ceddaf3baeed57522e571572b6b99b";>be8f330f</a>.</p>
+
+    <p>The issue was made public on 10 July 2025.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.8</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_11.0.8"><span 
class="pull-right">2025-06-09</span> Fixed in Apache Tomcat 11.0.8</h3><div 
class="text">
   
     <p><strong>Moderate: Security constraint bypass for PreResources and

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1927120&r1=1927119&r2=1927120&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Thu Jul 10 18:55:09 2025
@@ -37,41 +37,46 @@
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
     <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in Apache Tomcat 
9.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in Apache 
Tomcat 9.0.106</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in 
Apache Tomcat 9.0.105</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in Apache Tomcat 
9.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache 
Tomcat 9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in 
Apache Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed 
in Apache Tomcat 9.0.97</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache Tomcat 
9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache 
Tomcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in 
Apache Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed 
in Apache Tomcat 9.0.83</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache Tomcat 
 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache 
Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in 
Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed 
in Apache Tomcat 9.0.74</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat 
9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache 
Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in 
Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed 
in Apache Tomcat 9.0.68</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 
9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache 
Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in 
Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed 
in Apache Tomcat 9.0.58</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9
 .0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache 
Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in 
Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed 
in Apache Tomcat 9.0.45</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 
9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache 
Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in 
Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed 
in Apache Tomcat 9.0.38</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 
9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache 
Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in 
Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed 
in Apache Tomcat 9.0.31</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 9.
 0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache 
Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in 
Apache Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed 
in Apache Tomcat 9.0.20</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 
9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache 
Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in 
Apache Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed 
in Apache Tomcat 9.0.10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat 
9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache 
Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in 
Apache Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed 
in Apache Tomcat 9.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat 9.0.1</a></l
 i><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
Apache Tomcat 9.0.0.M18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in 
Apache Tomcat 9.0.0.M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 
9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in 
Apache Tomcat 9.0.0.M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 
9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache 
Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
-  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.107"><span 
class="pull-right">2025-07-XXX</span> Fixed in Apache Tomcat 9.0.107</h3><div 
class="text">
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.107"><span 
class="pull-right">2025-07-04</span> Fixed in Apache Tomcat 9.0.107</h3><div 
class="text">
 
-    <p><strong>Important: Dos with HTTP/2 and APR/Native</strong>
+    <p><strong>Important: APR/Native Connector crash leading to DoS</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52434"; 
rel="nofollow">CVE-2025-52434</a></p>
 
-    <p></p>
+    <p>A race condition on connection close could trigger a JVM crash when 
using
+       the APR/Native connector leading to a DoS. This was particularly
+       noticeable with client initiated closes of HTTP/2 connections.</p>
 
     <p>This was fixed with commit
        <a 
href="https://github.com/apache/tomcat/commit/8a83c3c42d20762782678932c14005cd3397a018";>8a83c3c4</a>.</p>
 
-    <p>The issue was made public on XXX July 2025.</p>
+    <p>The issue was made public on 10 July 2025.</p>
 
     <p>Affects: 9.0.0.M1 to 9.0.106</p>
 
-    <p><strong>Important: DoS due to overflow in file upload limit</strong>
+    <p><strong>Low: DoS due to overflow in file upload limit</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52520"; 
rel="nofollow">CVE-2025-52520</a></p>
 
-    <p></p>
+    <p>For some unlikely configurations of multipart upload, an Integer 
Overflow
+       vulnerability could lead to a DoS via bypassing of size limits.</p>
 
     <p>This was fixed with commit
        <a 
href="https://github.com/apache/tomcat/commit/927d66fbc294cb65242102b817a45fd80834e040";>927d66fb</a>.</p>
 
-    <p>The issue was made public on XXX July 2025.</p>
+    <p>The issue was made public on 10 July 2025.</p>
 
     <p>Affects: 9.0.0.M1 to 9.0.106</p>
 
     <p><strong>Important: DoS via excessive HTTP/2 streams</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53506"; 
rel="nofollow">CVE-2025-53506</a></p>
 
-    <p></p>
+    <p>An uncontrolled resource consumption vulnerability if an HTTP/2 client
+       did not acknowledge the initial settings frame that reduces the maximum
+       permitted concurrent streams could result in a DoS.</p>
 
     <p>This was fixed with commit
        <a 
href="https://github.com/apache/tomcat/commit/434772930f362145516dd60681134e7f0cf8115b";>43477293</a>.</p>
 
-    <p>The issue was made public on XXX July 2025.</p>
+    <p>The issue was made public on 10 July 2025.</p>
 
     <p>Affects: 9.0.0.M1 to 9.0.106</p>
 

Modified: tomcat/site/trunk/xdocs/security-10.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1927120&r1=1927119&r2=1927120&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml (original)
+++ tomcat/site/trunk/xdocs/security-10.xml Thu Jul 10 18:55:09 2025
@@ -56,6 +56,37 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 10.1.43" rtext="2025-07-04">
+
+    <p><strong>Low: DoS due to overflow in file upload limit</strong>
+       <cve>CVE-2025-52520</cve></p>
+
+    <p>For some unlikely configurations of multipart upload, an Integer 
Overflow
+       vulnerability could lead to a DoS via bypassing of size limits.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="fc42bbccb9041fafd194fbfdf3eab1d44cb5c45c"/>.</p>
+
+    <p>The issue was made public on 10 July 2025.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.42</p>
+
+    <p><strong>Important: DoS via excessive HTTP/2 streams</strong>
+       <cve>CVE-2025-53506</cve></p>
+
+    <p>An uncontrolled resource consumption vulnerability if an HTTP/2 client
+       did not acknowledge the initial settings frame that reduces the maximum
+       permitted concurrent streams could result in a DoS.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="2aa6261276ebe50b99276953591e3a2be7898bdb"/>.</p>
+
+    <p>The issue was made public on 10 July 2025.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.42</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 10.1.42" rtext="2025-06-09">
   
     <p><strong>Moderate: Security constraint bypass for PreResources and

Modified: tomcat/site/trunk/xdocs/security-11.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1927120&r1=1927119&r2=1927120&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml (original)
+++ tomcat/site/trunk/xdocs/security-11.xml Thu Jul 10 18:55:09 2025
@@ -50,6 +50,37 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 11.0.9" rtext="2025-07-04">
+
+    <p><strong>Low: DoS due to overflow in file upload limit</strong>
+       <cve>CVE-2025-52520</cve></p>
+
+    <p>For some unlikely configurations of multipart upload, an Integer 
Overflow
+       vulnerability could lead to a DoS via bypassing of size limits.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="a51e4bedccfafd35b7cdd0ee3e22267dee9f90db"/>.</p>
+
+    <p>The issue was made public on 10 July 2025.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.8</p>
+
+    <p><strong>Important: DoS via excessive HTTP/2 streams</strong>
+       <cve>CVE-2025-53506</cve></p>
+
+    <p>An uncontrolled resource consumption vulnerability if an HTTP/2 client
+       did not acknowledge the initial settings frame that reduces the maximum
+       permitted concurrent streams could result in a DoS.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="be8f330f83ceddaf3baeed57522e571572b6b99b"/>.</p>
+
+    <p>The issue was made public on 10 July 2025.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.8</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 11.0.8" rtext="2025-06-09">
   
     <p><strong>Moderate: Security constraint bypass for PreResources and

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1927120&r1=1927119&r2=1927120&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Thu Jul 10 18:55:09 2025
@@ -50,41 +50,46 @@
     <toc/>
   </section>
 
-  <section name="Fixed in Apache Tomcat 9.0.107" rtext="2025-07-XXX">
+  <section name="Fixed in Apache Tomcat 9.0.107" rtext="2025-07-04">
 
-    <p><strong>Important: Dos with HTTP/2 and APR/Native</strong>
+    <p><strong>Important: APR/Native Connector crash leading to DoS</strong>
        <cve>CVE-2025-52434</cve></p>
 
-    <p></p>
+    <p>A race condition on connection close could trigger a JVM crash when 
using
+       the APR/Native connector leading to a DoS. This was particularly
+       noticeable with client initiated closes of HTTP/2 connections.</p>
 
     <p>This was fixed with commit
        <hashlink hash="8a83c3c42d20762782678932c14005cd3397a018"/>.</p>
 
-    <p>The issue was made public on XXX July 2025.</p>
+    <p>The issue was made public on 10 July 2025.</p>
 
     <p>Affects: 9.0.0.M1 to 9.0.106</p>
 
-    <p><strong>Important: DoS due to overflow in file upload limit</strong>
+    <p><strong>Low: DoS due to overflow in file upload limit</strong>
        <cve>CVE-2025-52520</cve></p>
 
-    <p></p>
+    <p>For some unlikely configurations of multipart upload, an Integer 
Overflow
+       vulnerability could lead to a DoS via bypassing of size limits.</p>
 
     <p>This was fixed with commit
        <hashlink hash="927d66fbc294cb65242102b817a45fd80834e040"/>.</p>
 
-    <p>The issue was made public on XXX July 2025.</p>
+    <p>The issue was made public on 10 July 2025.</p>
 
     <p>Affects: 9.0.0.M1 to 9.0.106</p>
 
     <p><strong>Important: DoS via excessive HTTP/2 streams</strong>
        <cve>CVE-2025-53506</cve></p>
 
-    <p></p>
+    <p>An uncontrolled resource consumption vulnerability if an HTTP/2 client
+       did not acknowledge the initial settings frame that reduces the maximum
+       permitted concurrent streams could result in a DoS.</p>
 
     <p>This was fixed with commit
        <hashlink hash="434772930f362145516dd60681134e7f0cf8115b"/>.</p>
 
-    <p>The issue was made public on XXX July 2025.</p>
+    <p>The issue was made public on 10 July 2025.</p>
 
     <p>Affects: 9.0.0.M1 to 9.0.106</p>
 

Modified: tomcat/site/trunk/xdocs/sitemap-main.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/sitemap-main.xml?rev=1927120&r1=1927119&r2=1927120&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/sitemap-main.xml (original)
+++ tomcat/site/trunk/xdocs/sitemap-main.xml Thu Jul 10 18:55:09 2025
@@ -117,6 +117,26 @@
     <priority>0.5</priority>
   </url>
   <url>
+    <loc>http://tomcat.apache.org/oldnews-2024.html</loc>
+    <changefreq>monthly</changefreq>
+    <priority>0.4</priority>
+  </url>
+  <url>
+    <loc>http://tomcat.apache.org/oldnews-2023.html</loc>
+    <changefreq>monthly</changefreq>
+    <priority>0.4</priority>
+  </url>
+  <url>
+    <loc>http://tomcat.apache.org/oldnews-2022.html</loc>
+    <changefreq>monthly</changefreq>
+    <priority>0.4</priority>
+  </url>
+  <url>
+    <loc>http://tomcat.apache.org/oldnews-2021.html</loc>
+    <changefreq>monthly</changefreq>
+    <priority>0.4</priority>
+  </url>
+  <url>
     <loc>http://tomcat.apache.org/oldnews-2020.html</loc>
     <changefreq>monthly</changefreq>
     <priority>0.4</priority>



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to