FERRAMENTAS LINUX: Critical Tomcat 10 Security Update: Patch CVE-2025-31650 & CVE-2025-31651 Now

terça-feira, 13 de maio de 2025

Critical Tomcat 10 Security Update: Patch CVE-2025-31650 & CVE-2025-31651 Now

 

SUSE


Critical Tomcat 10.1.40 update fixes CVE-2025-31651 (CVSS 9.8 RCE) and CVE-2025-31650 (DoS) on SUSE Linux. Patch now to secure enterprise Java web servers.


High-Risk Vulnerabilities Threaten SUSE Linux Systems – Immediate Action Required

Why This Update Matters

The newly released Tomcat 10.1.40 patch addresses two severe vulnerabilities (CVSS scores up to 9.8) affecting SUSE Linux Enterprise ServeropenSUSE Leap, and related distributions. Enterprises relying on Apache Tomcat for Java web applications must prioritize this update to prevent remote code execution (RCE) and denial-of-service (DoS) attacks.


Vulnerability Details

CVE-2025-31650 (CVSS 8.7)

  • Impact: Invalid HTTP/2 priority field handling could crash servers (DoS).

  • Risk: Exploitable remotely without authentication (AV:N/PR:N).

  • Affected: All Tomcat 10.x deployments on SUSE 15 SP5/SP6.

CVE-2025-31651 (CVSS 9.8)

  • Impact: Malicious URL parsing bypass (; and ? characters) enabling RCE.

  • Risk: NVD rates this as CRITICAL due to full system compromise potential.

  • Solution: Update to Tomcat 10.1.40 immediately.


Affected Products

  • SUSE Linux Enterprise Server 15 SP5/SP6

  • SUSE Linux Enterprise High Performance Computing

  • openSUSE Leap 15.6

  • Web and Scripting Module 15-SP6

(Full list in SUSE’s advisory)


How to Patch

Recommended Methods

  1. YaST Online Update: Automated patch deployment for enterprise environments.

  2. Zypper CLI: Run the exact command for your OS:

bash
Copy
Download
# openSUSE Leap 15.6  
zypper in -t patch openSUSE-SLE-15.6-2025-1537=1  

(See full patch instructions for other distributions.)

FAQ

Q: Is this update relevant for cloud deployments?

A: Yes—AWS, Azure, and GCP instances running SUSE Linux must patch.

Q: Are there workarounds if I can’t update immediately?

A: No. CVSS 9.8 vulnerabilities require urgent patching.

Nenhum comentário:

Postar um comentário