Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tomcat10@10.1.25-1?distro=trixie
purl pkg:deb/debian/tomcat10@10.1.25-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-3vdn-j7sj-dfdn Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. CVE-2024-38286
GHSA-7jqf-v358-p8g7
VCID-8myk-ac5b-huh8 Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue. CVE-2024-34750
GHSA-wm9w-rjj3-j356

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T09:41:50.291840+00:00 Debian Importer Fixing VCID-8myk-ac5b-huh8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:36.937473+00:00 Debian Importer Fixing VCID-3vdn-j7sj-dfdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T07:35:27.602806+00:00 Debian Importer Fixing VCID-3vdn-j7sj-dfdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:00.101837+00:00 Debian Importer Fixing VCID-8myk-ac5b-huh8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:21.283518+00:00 Debian Importer Fixing VCID-3vdn-j7sj-dfdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:21.236836+00:00 Debian Importer Fixing VCID-8myk-ac5b-huh8 https://security-tracker.debian.org/tracker/data/json 38.1.0