Debian alert DSA-6120-1 (tomcat10)
| From: | Markus Koschany <apo@debian.org> | |
| To: | debian-security-announce@lists.debian.org | |
| Subject: | [SECURITY] [DSA 6120-1] tomcat10 security update | |
| Date: | Thu, 05 Feb 2026 20:48:16 +0000 | |
| Message-ID: | <aYUCEBVWNw6Vbp1j@seger.debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6120-1 security@debian.org https://www.debian.org/security/ Markus Koschany February 05, 2026 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tomcat10 CVE ID : CVE-2025-46701 CVE-2025-48976 CVE-2025-48988 CVE-2025-48989 CVE-2025-49125 CVE-2025-52520 CVE-2025-53506 CVE-2025-55668 CVE-2025-55752 CVE-2025-55754 CVE-2025-61795 CVE-2025-31650 CVE-2025-31651 Debian Bug : 1106820 1108119 1108117 1111097 1108115 1109112 1109114 1111099 1119294 Several security vulnerabilities have been found in Tomcat 10, a Java web server and servlet engine. This update improves the handling of HTTP/2 connections and corrects various flaws which can lead to uncontrolled resource consumption and a denial of service. For the oldstable distribution (bookworm), these problems have been fixed in version 10.1.52-1~deb12u1. For the stable distribution (trixie), these problems have been fixed in version 10.1.52-1~deb13u1. We recommend that you upgrade your tomcat10 packages. For the detailed security status of tomcat10 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tomcat10 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmmE/mhfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQsMg//TUTDx6e/P2VMn+Pn6cfc2ksf8YESdPBNNiSIzcHjXAdQ6nMRGWSxlnkv y2wEsHlTtFPzMTTIZItNuBoy9QJk9fWYufklWhLHonCja+Mps2H5ODHEsV+2UD+f ho27L2XGn4P0NrDrJ4WlKuXaWfycTST+ZTzSek2aCvj3wPB6PMF2tmXzWx18A+cC okvNhkNuTysJo3FBBkBRvrl3mmXVgNHZu+CoDpwVf73mLInSt9nE429yaiuJIRMr fjGR28k+u9Kk1v2Hn7EyX8jXVB+BYaSbovI5eJJ30fz1LfuDa/npQyJExcnuVdkA NOJKGS2EL2twDHanp/6WVe6NrAYrbncIv4Y5SU5So7BYRIFwIt72s33eLPcI/GJ1 qhn1JntnMLFqYTciPcLGshjm4W6ymWBFVn/pCL0Y3EuPbynKVrfvrsB1orfyceS6 TQtneXF8qhtUVSKWJ9YY1AQ31riSQv2Xtj1tg6ltre6W3qFRKJLoROXv8YWpAHDV 54KmJ0xeCCYn6H3Nfvbxzx5wDOqSpNnK/5v/3Av51VtSKnVBY0YItUCXKLjG+Mty kV4J7IMYL1N4mKBUWD+ZlLwbtykAC/GiZjCI+I8IXYBZOkbY0l9tAtBg3dYSIYyl UNRtTignCBUWyojsm/tU9UYl/pEGicCfB+sYveuuQmgiR+wEduQ= =6PN/ -----END PGP SIGNATURE-----
